Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
  • References (0)
  • Citations (169)
References0
Newest
Cited By169
Newest
Published on Jun 1, 2019in Designs, Codes and Cryptography 1.22
David Derler7
Estimated H-index: 7
(Graz University of Technology),
Daniel Slamanig13
Estimated H-index: 13
(Austrian Institute of Technology)
Key-homomorphic properties of cryptographic objects, i.e., homomorphisms on their key space, have proven to be useful, both from a theoretical as well as a practical perspective. Important cryptographic objects such as pseudorandom functions or (public key) encryption have been studied previously with respect to key-homomorphisms. Interestingly, however, signature schemes have not been explicitly investigated in this context so far. We close this gap and initiate the study of key-homomorphic sig...
Source Cite
Published on Jan 1, 2019
Masayuki Fukumitsu (Hokkaido Information University), Hasegawa Shingo3
Estimated H-index: 3
(Tohoku University)
Source Cite
Published on Apr 9, 2018
Clémentine Gritti2
Estimated H-index: 2
(EURECOM: Institut Eurécom),
Refik Molva30
Estimated H-index: 30
(EURECOM: Institut Eurécom),
Melek Önen13
Estimated H-index: 13
(EURECOM: Institut Eurécom)
Internet of Things (IoT) offers new opportunities for business, technology and science but it also raises new challenges in terms of security and privacy, mainly because of the inherent characteristics of this environment: IoT devices come from a variety of manufacturers and operators and these devices suffer from constrained resources in terms of computation, communication and storage. In this paper, we address the problem of trust establishment for IoT and propose a security solution that cons...
Source Cite
Bartosz Nakielski2
Estimated H-index: 2
,
Jacek Pomykała2
Estimated H-index: 2
(University of Warsaw),
Janusz Andrzej Pomykała1
Estimated H-index: 1
4 Citations Source Cite
Published on Nov 1, 2017
Hideharu Kojima , Naoto Yanai3
Estimated H-index: 3
(AIST: National Institute of Advanced Industrial Science and Technology)
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes...
Source Cite
Published on May 1, 2017 in ICNSC (International Conference on Networking, Sensing and Control)
Lifei Wei9
Estimated H-index: 9
(College of Information Technology),
Lei Zhang2
Estimated H-index: 2
(College of Information Technology)
+ 1 AuthorsKai Zhang3
Estimated H-index: 3
(ECNU: East China Normal University)
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving...
Source Cite
Published on Jan 13, 2017 in ICML (International Conference on Machine Learning)
This paper proposes a concept of multi-section multi-signature model with distinguished signing responsibilities. The model has overcome the limitation of some previous multi-signatures models by allowing every signer to sign and be responsible for one or multiple sections of the signed message. A theoretical analysis against two common types of digital signature attacks has proved the model security assurance level.
Source Cite
Published on Jan 1, 2017in International Journal of Computer Mathematics 1.20
Sk Hafizul Islam11
Estimated H-index: 11
(BITS: Birla Institute of Technology and Science),
Mohammad Sabzinejad Farash18
Estimated H-index: 18
(Kharazmi University)
+ 2 AuthorsMohammad S. Obaidat30
Estimated H-index: 30
(Fordham University)
In a digital multisignature scheme, two or more signers are allowed to produce a single signature on a common message, which can be verified by anyone. In the literature, many schemes are available based on the public key infrastructure or identity-based cryptosystem with bilinear pairing and map-to-point MTP hash function. The bilinear pairing and the MTP function are time-consuming operations and they need a large super-singular elliptic curve group. Moreover, the cryptosystems based on them a...
3 Citations Source Cite
Manoj Kumar Chande1
Estimated H-index: 1
,
Te Yu Chen1
Estimated H-index: 1
,
Cheng-Chi Lee27
Estimated H-index: 27
Zhang and Xiao presented a multi-signature scheme for a specified group of verifiers and showed that forging their signature is mathematically equivalent to forge Harn's signature. However, Zhang and Xiao's scheme is not secure against the rogue-key attack. In this paper, we show how to mount a rogue-key attack on Zhang and Xiao's scheme and propose an improved multi-signature scheme for a specified group of verifiers. Our new scheme not only inherits the advantages of Zhang and Xiao's scheme, b...
Source Cite
Published on Dec 12, 2016
Hung Dao Tuan1
Estimated H-index: 1
,
Hieu Minh Nguyen1
Estimated H-index: 1
+ 2 AuthorsMoldovyan Nikolay Adreevich1
Estimated H-index: 1
This paper proposes two new variants of group signature protocols with and without distinguished signing authorities based on the multisignature signature scheme to reduce significantly the signature length and masking signers public keys. The proposed protocols do not include a secret sharing and knowledge proving procedure. Thus, these protocols allow a flexible modification of the group structure by the group manager. Compared to the known group signature protocols, our protocols are designed...
1 Citations Source Cite