Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleApril 2023
- ArticleAugust 2022
- research-articleNovember 2020
Pairing free identity based aggregate signcryption scheme
IET Information Security (ISE2), Volume 14, Issue 6Pages 625–632https://doi.org/10.1049/iet-ifs.2019.0579The idea of aggregate signcryption was first proposed by Selvi. The aggregation process reduces the communication overhead and hence, it is efficient in low‐bandwidth communication networks such as wireless sensor networks and vehicular ad‐hoc network ...
- research-articleMay 2018
On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption
APKC '18: Proceedings of the 5th ACM on ASIA Public-Key Cryptography WorkshopPages 45–51https://doi.org/10.1145/3197507.3197515In 1999, Micali, Rabin and Vadhan introduced the notion of Verifiable Random Functions (VRF)\citeFOCS:MicRabVad99. VRFs compute for a given input x and a secret key $sk$ a unique function value $y=V_sk (x)$, and additionally a publicly verifiable proof ...
- research-articleMarch 2018
Efficient identity‐based blind message recovery signature scheme from pairings
IET Information Security (ISE2), Volume 12, Issue 2Pages 150–156https://doi.org/10.1049/iet-ifs.2017.0342Blind signature (BS) schemes are a vital tool to design electronic cash (e‐cash), online transaction, electronic voting (e‐voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and ...
-
- articleNovember 2015
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
Security and Communication Networks (SACN), Volume 8, Issue 17Pages 3167–3179https://doi.org/10.1002/sec.1241Among the existing identity-based authenticated key agreement ID-AKA protocols, there are only a few of them that can resist to leakage of ephemeral secret keys, which is about the protection of the session secret key after the ephemeral secret keys of ...
- ArticleMarch 2023
Implementing Cryptographic Pairings at Standard Security Levels
Security, Privacy, and Applied Cryptography EngineeringPages 28–46https://doi.org/10.1007/978-3-319-12060-7_3AbstractThis study reports on an implementation of cryptographic pairings in a general purpose computer algebra system. For security levels equivalent to the different AES flavours, we exhibit suitable curves in parametric families and show that optimal ...
- research-articleMay 2013
Blank digital signatures
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityPages 95–106https://doi.org/10.1145/2484313.2484324In this paper we present a novel type of digital signatures, which we call blank digital signatures. The basic idea behind this scheme is that an originator can define and sign a message template, describing fixed parts of a message as well as multiple ...
- ArticleFebruary 2013
Proxy re-encryption in a stronger security model extended from CT-RSA2012
CT-RSA'13: Proceedings of the 13th international conference on Topics in CryptologyPages 277–292https://doi.org/10.1007/978-3-642-36095-4_18Proxy re-encryption (PRE) realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob, and cannot learn anything about the ...
- chapterJanuary 2012
Dynamic secure cloud storage with provenance
Cryptography and SecurityJanuary 2012, Pages 442–464One concern in using cloud storage is that the sensitive data should be confidential to the servers which are outside the trust domain of data owners. Another issue is that the user may want to preserve his/her anonymity in the sharing or accessing of ...
- short-paperMarch 2011
Server-aided signatures verification secure against collusion attack
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications SecurityPages 401–405https://doi.org/10.1145/1966913.1966967Wireless handheld devices which support e-mail and web browsing are increasingly popular. The authenticity of the information received is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification ...
- ArticleDecember 2010
A survey of local and global pairings on elliptic curves and abelian varieties
Pairing'10: Proceedings of the 4th international conference on Pairing-based cryptographyPages 377–396There are many bilinear pairings that naturally appear when one studies elliptic curves, abelian varieties, and related groups. Some of these pairings, notably the Weil and Lichtenbaum-Tate pairings, can be defined over finite fields and have important ...
- ArticleDecember 2010
Designing a code generator for pairing based cryptographic functions
Pairing'10: Proceedings of the 4th international conference on Pairing-based cryptographyPages 207–224Pairing-Based Cryptography has become relevant in industry mainly because of the increasing interest in Identity-Based protocols. A major deterrent to the general use of pairing-based protocols is the complex nature of such protocols; efficient ...
- ArticleDecember 2010
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys
Pairing'10: Proceedings of the 4th international conference on Pairing-based cryptographyPages 187–205One advantage of identity-based (ID-based) primitives is the reduced overhead of maintaining multiple static key pairs and the corresponding certificates. However, should a party wish to participate in more than one protocol with the same identity (ID), ...
- ArticleNovember 2010
An ID-Based Proxy Multi-signcryption Scheme from Pairings
MINES '10: Proceedings of the 2010 International Conference on Multimedia Information Networking and SecurityPages 403–405https://doi.org/10.1109/MINES.2010.90Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption in a logical single step,at lower computational costs and communication overheads than the traditional signature-then-encryption ...
- ArticleSeptember 2010
Get shorty via group signatures without encryption
SCN'10: Proceedings of the 7th international conference on Security and cryptography for networksPages 381–398Group signatures allow group members to anonymously sign messages in the name of a group such that only a dedicated opening authority can reveal the exact signer behind a signature. In many of the target applications, for example in sensor networks or ...
- research-articleSeptember 2010
Anonymous Multireceiver Identity-Based Encryption
IEEE Transactions on Computers (ITCO), Volume 59, Issue 9Pages 1239–1249https://doi.org/10.1109/TC.2010.23Recently, many multireceiver identity-based encryption schemes have been proposed in the literature. However, none can protect the privacy of message receivers among these schemes. In this paper, we present an anonymous multireceiver identity-based ...
- ArticleAugust 2010
New software speed records for cryptographic pairings
This paper presents new software speed records for the computation of cryptographic pairings. More specifically, we present details of an implementation which computes the optimal ate pairing on a 257- bit Barreto-Naehrig curve in only 4,470,408 cycles ...
- ArticleAugust 2010
Fixed argument pairings
A common scenario in many pairing-based cryptographic protocols is that one argument in the pairing is fixed as a long term secret key or a constant parameter in the system. In these situations, the runtime of Miller's algorithm can be significantly ...
- ArticleJuly 2010
An efficient blind ring signature scheme without pairings
WAIM'10: Proceedings of the 2010 international conference on Web-age information managementPages 177–188Anonymous technology can realize the privacy-preserving of the user's information, thus it plays an important role in the e-commerce application. As two important cryptographic techniques, blind signature and ring signature can realize anonymity. Thus, ...