Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations

A Singla, R Behnia, SR Hussain, A Yavuz… - Proceedings of the 2021 …, 2021 - dl.acm.org
The lack of authentication protection for bootstrapping messages broadcast by base-stations
makes impossible for devices to differentiate between a legitimate and a fake base-station …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM

JC Loh, F Guo, W Susilo - … Conference on Information Security and Privacy, 2024 - Springer
Identity-based signatures (IBS) allow the signer's identity information to be used as the
public key for signature verification, eliminating the need for managing certificates to …

A Galindo-Garcia-like identity-based signature with tight security reduction, revisited

M Fukumitsu, S Hasegawa - 2018 Sixth International …, 2018 - ieeexplore.ieee.org
Galindo-Garcia identity-based signature (GG09 IBS) is an efficient identity-based signature
(IBS) based on Schnorr signature scheme. The security of GG09 IBS is proven in the random …

Identity-Based Signature from Lattices Without Trapdoors

P Luo, X Chen, W Susilo, Q Huang - International Conference on …, 2024 - Springer
Currently, the majority of lattice-base identity-based signature (LB-IBS) schemes rely on
lattice trapdoor technique introduced by Gentry, Peikert, and Vaikuntanathan. However, this …

A hess-like signature scheme based on implicit and explicit certificates

T Hyla, J Pejaś - The Computer Journal, 2017 - academic.oup.com
The main goal of introducing an identity-based cryptosystem and certificateless
cryptosystem was avoiding certificates' management costs. In turn, the goal of introducing a …

On performance of parallel iSCSI protocol for networked storage systems

QK Yang - … Information Networking and Applications-Volume 1 …, 2006 - ieeexplore.ieee.org
A newly emerging protocol for storage networking, iSCSI [1, 2], was recently ratified by the
Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alternative …

A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM

JC Loh, F Guo, W Susilo, G Yang - Australasian Conference on …, 2023 - Springer
Identity-based signatures (IBS) can be verified using the signer identity information as the
public key, and hence, there is no need for certificate management that proves the …

A Galindo-Garcia-like identity-based signature with tight security reduction

M Fukumitsu, S Hasegawa - 2017 Fifth International …, 2017 - ieeexplore.ieee.org
Galindo and Garcia proposed an identity-based signature based on the Schnorr signature.
Although their scheme is proven to be secure in the random oracle model, the security …

A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound

S Chatterjee, C Kamath - Algorithmica, 2016 - Springer
Abstract Boldyreva, Palacio and Warinschi introduced a multiple forking game as an
extension of general forking. The notion of (multiple) forking is a useful abstraction from the …