Aggregate signatures allow someone to aggregate multiple signatures into one signature, which is suitable for resource-constrained and computationally inefficient environments. Identify-based aggregate signature can solve the storage problem of public key certificates while achieving efficient signature verification. However, in most of the identity-based aggregate signature schemes, the user identity revocation process is time-consuming and cannot resist quantum attacks. To solve above problems, this paper proposes a lattice-based aggregate signature scheme with dynamic identity revocation by combining lattice-based cryptography and an aggregate signature scheme. The security of the proposed lattice-based aggregate signature scheme with dy...
10 pages.A designated verifier signature convinces only the specific recipient of the message of its...
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent ...
A designated verifier signature convinces only the specific recipient of the message of its integrit...
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to...
Development of Internet of Vehicles (IoV) has aroused extensive attention in recent years. The IoV r...
As vehicle speed is fast and on board units' (OBUs) computing power, storage space, bandwidth and ot...
In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attra...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct mess...
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access ...
Certificateless public key cryptosystem solves both the complex certificate management problem in th...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct mess...
10 pages.A designated verifier signature convinces only the specific recipient of the message of its...
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent ...
A designated verifier signature convinces only the specific recipient of the message of its integrit...
The internet-of-things (also known as IoT) connects a large number of information-sensing devices to...
Development of Internet of Vehicles (IoV) has aroused extensive attention in recent years. The IoV r...
As vehicle speed is fast and on board units' (OBUs) computing power, storage space, bandwidth and ot...
In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attra...
Abstract. Support of membership revocation is a desirable functionality for any group signature sche...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Building cryptographic schemes upon as many fundamentally different hard problems as possible, seems...
An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct mess...
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access ...
Certificateless public key cryptosystem solves both the complex certificate management problem in th...
Support of membership revocation is a desirable functionality for any group signature scheme. Among ...
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct mess...
10 pages.A designated verifier signature convinces only the specific recipient of the message of its...
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent ...
A designated verifier signature convinces only the specific recipient of the message of its integrit...