Articles with "group signature" as a keyword



Photo by papaioannou_kostas from unsplash

Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-018-0698-2

Abstract: As IoT technology evolves, developments of ubiquitous computing accelerates. At the same time, threats of privacy exposure also increase since the IoT systems expose the information such as user’s location or medical status collected from… read more here.

Keywords: privacy; group signature; linkability; exposure ... See more keywords

A New Constant-Size Group Signature Scheme From Lattices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2964686

Abstract: A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some… read more here.

Keywords: group signature; signature; group; signature scheme ... See more keywords
Photo from wikipedia

AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2997840

Abstract: As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and… read more here.

Keywords: group signature; scheme; anonymous authentication; authentication scheme ... See more keywords

Blockchain-based Edge Computing Data Storage Protocol Under Simplified Group Signature

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2021.3062348

Abstract: In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an… read more here.

Keywords: group signature; storage; group; edge computing ... See more keywords
Photo by lucabravo from unsplash

Provably Secure Group Signature Schemes From Code-Based Assumptions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2020.2976073

Abstract: We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the… read more here.

Keywords: code based; signature schemes; provably secure; group signature ... See more keywords