Security proofs for identity-based identification and signature schemes

M Bellare, C Namprempre, G Neven - Journal of Cryptology, 2009 - Springer
This paper provides either security proofs or attacks for a large number of identity-based
identification and signature schemes defined either explicitly or implicitly in existing …

Attribute-based signature and its applications

J Li, MH Au, W Susilo, D Xie, K Ren - … of the 5th ACM symposium on …, 2010 - dl.acm.org
In an attribute-based signature (ABS), users sign messages with any predicate of their
attributes issued from an attribute authority. Under this notion, a signature attests not to the …

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks

JL Li, KKR Choo, WG Zhang, S Kumari… - Vehicular …, 2018 - Elsevier
Unlike wired networks, vehicular ad hoc networks (VANETs) are subject to a broader range
of attacks due to its wireless broadcast nature. One of the potential cryptographic solutions to …

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing

A Boldyreva, C Gentry, A O'Neill, DH Yum - Proceedings of the 14th ACM …, 2007 - dl.acm.org
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …

Hidden attribute-based signatures without anonymity revocation

J Li, K Kim - Information Sciences, 2010 - Elsevier
We propose a new notion called hidden attribute-based signature, which is inspired by the
recent developments in attribute-based cryptosystem. With this technique, users are able to …

CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles

J Li, Y Ji, KKR Choo, D Hogrefe - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The conditional privacy-preserving authentication (CPPA) protocol has applications in the
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …

Identity-based multi-signatures from RSA

M Bellare, G Neven - Cryptographers' Track at the RSA Conference, 2007 - Springer
Multi-signatures allow multiple signers to jointly authenticate a message using a single
compact signature. Many applications however require the public keys of the signers to be …

Indoor positioning: A key enabling technology for IoT applications

D Macagnano, G Destino… - 2014 IEEE World Forum on …, 2014 - ieeexplore.ieee.org
Motivated by the recent advances on internet of things (IoT) and the importance that location
information has on many application scenarios, this article offers references to theoretical …

Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles

M Rückert - … Workshop, PQCrypto 2010, Darmstadt, Germany, May …, 2010 - Springer
We propose a variant of the “bonsai tree” signature scheme, a lattice-based existentially
unforgeable signature scheme in the standard model. Our construction offers the same …

A2BE: Accountable attribute-based encryption for abuse free access control

J Li, K Ren, K Kim - Cryptology ePrint Archive, 2009 - eprint.iacr.org
As a recently proposed public key primitive, attribute-based encryption (ABE)(including
Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for …