• References (0)
  • Citations (169)
Cited By169
Published on Jan 1, 2019 in CCS (Computer and Communications Security)
Estimated H-index: 11
(Fudan University)
Published on Jun 1, 2019in Designs, Codes and Cryptography1.22
David Derler7
Estimated H-index: 7
(Graz University of Technology),
Daniel Slamanig13
Estimated H-index: 13
(Austrian Institute of Technology)
Key-homomorphic properties of cryptographic objects, i.e., homomorphisms on their key space, have proven to be useful, both from a theoretical as well as a practical perspective. Important cryptographic objects such as pseudorandom functions or (public key) encryption have been studied previously with respect to key-homomorphisms. Interestingly, however, signature schemes have not been explicitly investigated in this context so far. We close this gap and initiate the study of key-homomorphic sig...
Published on Jan 1, 2019
Masayuki Fukumitsu (Hokkaido Information University), Hasegawa Shingo3
Estimated H-index: 3
(Tohoku University)
Published on Apr 9, 2018
Clémentine Gritti2
Estimated H-index: 2
(EURECOM: Institut Eurécom),
Refik Molva30
Estimated H-index: 30
(EURECOM: Institut Eurécom),
Melek Önen13
Estimated H-index: 13
(EURECOM: Institut Eurécom)
Internet of Things (IoT) offers new opportunities for business, technology and science but it also raises new challenges in terms of security and privacy, mainly because of the inherent characteristics of this environment: IoT devices come from a variety of manufacturers and operators and these devices suffer from constrained resources in terms of computation, communication and storage. In this paper, we address the problem of trust establishment for IoT and propose a security solution that cons...
Bartosz Nakielski2
Estimated H-index: 2
Jacek Pomykała2
Estimated H-index: 2
(University of Warsaw),
Janusz Andrzej Pomykała1
Estimated H-index: 1
Published on Nov 1, 2017
Hideharu Kojima , Naoto Yanai3
Estimated H-index: 3
(AIST: National Institute of Advanced Industrial Science and Technology)
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes...
Published on May 1, 2017 in ICNSC (International Conference on Networking, Sensing and Control)
Lifei Wei9
Estimated H-index: 9
(College of Information Technology),
Lei Zhang2
Estimated H-index: 2
(College of Information Technology)
+ 1 AuthorsKai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University)
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving...
Published on Jan 13, 2017 in ICML (International Conference on Machine Learning)
This paper proposes a concept of multi-section multi-signature model with distinguished signing responsibilities. The model has overcome the limitation of some previous multi-signatures models by allowing every signer to sign and be responsible for one or multiple sections of the signed message. A theoretical analysis against two common types of digital signature attacks has proved the model security assurance level.
Published on Jan 1, 2017in International Journal of Computer Mathematics1.20
Sk Hafizul Islam11
Estimated H-index: 11
(BITS: Birla Institute of Technology and Science),
Mohammad Sabzinejad Farash18
Estimated H-index: 18
(Kharazmi University)
+ 2 AuthorsMohammad S. Obaidat30
Estimated H-index: 30
(Fordham University)
In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the MTP function are time-consuming operations and they need a large super-singular elliptic curve group. Moreover, the cryptosystems based on them a...