TITLE

Cryptanalysis of a certificateless aggregate signature scheme

AUTHOR(S)
Wang, Liangliang; Chen, Kefei; Long, Yu; Wang, Huige
PUB. DATE
July 2016
SOURCE
Security & Communication Networks;7/25/2016, Vol. 9 Issue 11, p1353
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
An aggregate signature refers to a signature, by which n signatures σ1,..., σ n corresponding to n messages m1,..., m n and n users u1,..., u n can be transformed into a single short signature
ACCESSION #
116123723

 

Related Articles

  • Secure JTAG Implementation Using Schnorr Protocol. Das, Amitabh; Rolt, Jean; Ghosh, Santosh; Seys, Stefaan; Dupuis, Sophie; Natale, Giorgio; Flottes, Marie-Lise; Rouzeyre, Bruno; Verbauwhede, Ingrid // Journal of Electronic Testing;Apr2013, Vol. 29 Issue 2, p193 

    The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external...

  • Software-Defined Networking Switches for Fast Single-Link Failure Recovery. LI, DAWEI; WU, JIE; WANG, DAJIN; WANG, JIAYIN // Journal of Interconnection Networks;Dec2018, Vol. 18 Issue 4, pN.PAG 

    In this paper, we consider IP fast recovery from single-link failures in a given network topology. The basic idea is to replace some existing routers with a designated switch. When a link fails, the affected router will send all the affected traffic to the designated switch (through...

  • Identity-based optimistic fair exchange in the standard model. Zhang, Lei; Wu, Qianhong; Qin, Bo // Security & Communication Networks;Aug2013, Vol. 6 Issue 8, p1010 

    ABSTRACT A fair exchange protocol allows two entities to exchange digital signatures over open networks in a fair way, so that either each entity obtains the other's signature or neither entity does. Fair exchange protocol plays an important role in electronic commerce in the case of exchanging...

  • RAMBUS LAUNCHES SUITE OF DPA RESISTANT CORES.  // Computer Protocols;Nov2014, Vol. 28 Issue 11, p2 

    The article offers information on the family of differential power analysis (DPA) resistant cryptographic Internet protocol (IP) cores from semiconductor security research and development provider Cryptography Research, a division of technology licensing company Rambus Inc.

  • An Undeniable Signature Scheme Based on Lattice. Shuang Li; Chen Wang // International Journal of Advancements in Computing Technology;Jul2012, Vol. 4 Issue 12, p260 

    In this paper, we propose a protocol of undeniable signature based on lattice. Its security could be reduced to a well-known signature called NTRUSign. We also give the definition of invisibility and anonymity to the setting of identity based undeniable signature. In the end we prove that the...

  • Internet Key Exchange Aggressive mode negotiations using Cookie and Nonce Alternatives. Yalamanchili, Sushma; Chowdary, Ch. Smitha; Rao, M. Kameswara // International Journal of Advanced Research in Computer Science;Jul2011, Vol. 2 Issue 4, p368 

    The Internet is constantly evolving with new technology, networks, applications and users that require different levels of security. It is therefore a requirement that security requirements be reassessed at frequent intervals of time by all stakeholders. Internet Security Protocol (IPSec)...

  • A Server-Aided Verification Signature Scheme without Random Oracles. Bin Wang // International Review on Computers & Software;Dec2012, Vol. 7 Issue 7, p3446 

    Wu et al. defined three security notions for server aided verification (SAV) protocols to prevent a server from convincing a verifier that an invalid signature is valid. Security against strong collusion attacks provides the strongest security guarantee among these notions. They constructed SAV...

  • A DSA-BASED SCHEME FOR DEFENDING AGAINST IP PREFIX HIJACKING WITHOUT REPOSITORIES. Bo Yang // Tehnicki vjesnik / Technical Gazette;Jul/Aug2016, Vol. 23 Issue 4, p985 

    IP prefix hijacking poses a serious threat to the security of the Internet. Cryptographic authenticating origin ASes (Autonomous Systems) of advertised prefix, which is an effective way of preventing IP prefix hijacking, has received wide acceptance. However, these existing schemes received...

  • Design of digital signature scheme based on elliptic curve cryptosystem. ShiGuo Jin; GuangJiang Wang // Applied Mechanics & Materials;2014, Issue 685, p579 

    Digital signature is electronically password technique for electronic document signature. Elliptic curve cryptography is a method of public key cryptography based on elliptic curve mathematical. Digital signature scheme consists of three processes: initialization process, the signature...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics