Public integrity auditing for shared dynamic cloud data with group user revocation
T Jiang, X Chen, J Ma - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
The advent of the cloud computing makes storage outsourcing become a rising trend, which
promotes the secure remote data auditing a hot topic that appeared in the research …
promotes the secure remote data auditing a hot topic that appeared in the research …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
Group signatures from lattices: simpler, tighter, shorter, ring-based
We introduce a lattice-based group signature scheme that provides several noticeable
improvements over the contemporary ones: simpler construction, weaker hardness …
improvements over the contemporary ones: simpler construction, weaker hardness …
Secure data query framework for cloud and fog computing
K Gu, N Wu, B Yin, W Jia - IEEE Transactions on Network and …, 2019 - ieeexplore.ieee.org
Fog computing is mainly used to process a large amount of data produced by terminal
devices. As fog nodes are the closest acquirers to the terminal devices, the processed data …
devices. As fog nodes are the closest acquirers to the terminal devices, the processed data …
Foundations of fully dynamic group signatures
Group signatures are a central cryptographic primitive that has received a considerable
amount of attention from the cryptographic community. They allow members of a group to …
amount of attention from the cryptographic community. They allow members of a group to …
Simpler efficient group signatures from lattices
PQ Nguyen, J Zhang, Z Zhang - IACR international workshop on public …, 2015 - Springer
A group signature allows a group member to anonymously sign messages on behalf of the
group. In the past few years, new group signatures based on lattice problems have …
group. In the past few years, new group signatures based on lattice problems have …
Lattice-based group signatures: achieving full dynamicity with ease
Lattice-based group signature is an active research topic in recent years. Since the
pioneering work by Gordon et al.(Asiacrypt 2010), eight other schemes have been …
pioneering work by Gordon et al.(Asiacrypt 2010), eight other schemes have been …
Group signatures with almost-for-free revocation
Group signatures are a central cryptographic primitive where users can anonymously and
accountably sign messages in the name of a group they belong to. Several efficient …
accountably sign messages in the name of a group they belong to. Several efficient …
[HTML][HTML] Constant-size structure-preserving signatures: Generic constructions and simple assumptions
This paper presents efficient structure-preserving signature schemes based on simple
assumptions such as decisional linear. We first give two general frameworks for constructing …
assumptions such as decisional linear. We first give two general frameworks for constructing …