Security proofs for identity-based identification and signature schemes
This paper provides either security proofs or attacks for a large number of identity-based
identification and signature schemes defined either explicitly or implicitly in existing …
identification and signature schemes defined either explicitly or implicitly in existing …
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their
attributes issued from an attribute authority. Under this notion, a signature attests not to the …
attributes issued from an attribute authority. Under this notion, a signature attests not to the …
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks
Unlike wired networks, vehicular ad hoc networks (VANETs) are subject to a broader range
of attacks due to its wireless broadcast nature. One of the potential cryptographic solutions to …
of attacks due to its wireless broadcast nature. One of the potential cryptographic solutions to …
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
Hidden attribute-based signatures without anonymity revocation
We propose a new notion called hidden attribute-based signature, which is inspired by the
recent developments in attribute-based cryptosystem. With this technique, users are able to …
recent developments in attribute-based cryptosystem. With this technique, users are able to …
CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles
J Li, Y Ji, KKR Choo, D Hogrefe - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The conditional privacy-preserving authentication (CPPA) protocol has applications in the
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …
Identity-based multi-signatures from RSA
Multi-signatures allow multiple signers to jointly authenticate a message using a single
compact signature. Many applications however require the public keys of the signers to be …
compact signature. Many applications however require the public keys of the signers to be …
Indoor positioning: A key enabling technology for IoT applications
D Macagnano, G Destino… - 2014 IEEE World Forum on …, 2014 - ieeexplore.ieee.org
Motivated by the recent advances on internet of things (IoT) and the importance that location
information has on many application scenarios, this article offers references to theoretical …
information has on many application scenarios, this article offers references to theoretical …
Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles
M Rückert - … Workshop, PQCrypto 2010, Darmstadt, Germany, May …, 2010 - Springer
We propose a variant of the “bonsai tree” signature scheme, a lattice-based existentially
unforgeable signature scheme in the standard model. Our construction offers the same …
unforgeable signature scheme in the standard model. Our construction offers the same …
A2BE: Accountable attribute-based encryption for abuse free access control
As a recently proposed public key primitive, attribute-based encryption (ABE)(including
Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for …
Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for …