Article
Computer Science, Information Systems
Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen
Summary: This paper introduces an efficient identity-based signature scheme that is proved secure under the standard model. The scheme's security is reduced to the well-known computational Diffie-Hellman assumption, and it outperforms related schemes in terms of computation cost for signing and verification.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Hardware & Architecture
Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan
Summary: Internet of things (IoT) devices are used to provide services and minimize data storage and processing by gathering data and sending it to cloud servers. The proposed provably secure certificateless signature (PSCLS) scheme addresses the issues of computational overhead and adversarial attacks faced by current certificateless signature schemes in the industrial IoT network.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Yan Yang, Xingang Shi, Qiang Ma, Yahui Li, Xia Yin, Zhiliang Wang
Summary: This paper examines the stability issue caused by partially deployed secure BGP mechanisms. By analyzing the characteristics of topology and routing strategies, we find that casually deploying security mechanisms may result in BGP oscillation problems, affecting the security and quality of inter-domain communications. To avoid oscillation issues, we propose deployment guidelines.
Article
Computer Science, Information Systems
Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li
Summary: In this paper, a dynamic contributory Group Key Agreement protocol using Short Signature (GKA-SS) is proposed to resist positive attacks and achieve backward secrecy and forward secrecy. The protocol is shown to be faster than TGECDH in the join and leave phases.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary, Murat Yuksel, David Mohaisen
Summary: This paper proposes RouteChain, a blockchain-based secure BGP routing system that counters BGP hijacking and maintains a consistent view of Internet routing paths. By leveraging the provenance assurance and tamper-proof properties of blockchains, trust among autonomous systems is enhanced, allowing for efficient detection of false prefix announcements and prevention of BGP attacks over the Internet.
Article
Computer Science, Information Systems
Zhiwei Yan, Jong-Hyouk Lee
Summary: BGP is a fundamental infrastructure in the current Internet, but lacks security considerations and deterministic routing support for future applications. To address this, a novel BGP management architecture called BGPChain, based on blockchain technology, is proposed to establish a secure, smart, and agile routing infrastructure for the future Internet.
Article
Computer Science, Information Systems
Xurui Zheng, Fuyong Zheng, Xianming Liu, Dejun Wang, Jun Wang, Bo Meng
Summary: The study proposed a policy-controlled signature scheme with strong expressiveness and privacy-preserving policy, supporting fine-grained signature verification and demonstrating superiority in features, computation cost, and storage compared to related schemes.
Article
Quantum Science & Technology
Xiangjun Xin, Li Ding, Tianyuan Zhang, Qinglan Yang, Chaoyang Li
Summary: The researchers propose a provable secure arbitrator quantum signature (AQS) scheme based on the non-orthogonal entangled-triple sequence. Theoretical security proof, non-cloning theorem, and non-repudiation analysis are presented to ensure the security of the AQS. Compared to similar schemes, this proposal has better merits in security and efficiency.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Computer Science, Information Systems
Gayathri Nemani Bhagya, Gowri Thumbur, Krishna Rao Ravva Rama Venkata, Punugu Vasudeva Reddy
Summary: This paper proposes a pairing-free certificateless directed signature scheme to improve computational and communication efficiency, which is proven secure in the random oracle model. Efficiency analysis shows that the proposed scheme is more efficient compared to existing schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Nabeil Eltayieb, Rashad Elhabob, Muhammad Umar Aftab, Ramil Kuleev, Manuel Mazzara, Muhammad Ahmad
Summary: This paper proposes an authentication protocol with a full aggregation signature to secure smart city applications. By using a certificate-less aggregate signature (CLAS), message authentication, user anonymity, constant signature size, unlinkability, and resistance to replay attacks can be achieved. Performance evaluation results show that the proposed CLAS performs better than existing relevant schemes.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Shuanggen Liu, Kang Chen, Zikang Liu, Teng Wang
Summary: This article improves the security of the SM9 algorithm by proposing an approach based on multiple KGCs and introducing a new threshold ring signature scheme combining SM9. Both schemes have advantages in security and extend the application scenarios of SM9, playing a positive role in the promotion of the algorithm.
Article
Computer Science, Hardware & Architecture
Toru Nakanishi, Hiromi Yoshino, Tomoki Murakami, Guru-Vamsi Policharla
Summary: This paper proposes a graph signature and proof system based on bilinear groups and bilinear map accumulators, which can be used to prove connectivity and isolation relations in a graph. The proof size and verification cost are independent of the total numbers of vertexes and edges.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
(2022)
Article
Computer Science, Information Systems
Kyung-Ah Shim
Summary: This study analyzes the security of five recently proposed certificateless signature and certificateless aggregate signature schemes and identifies various attack methods. It also presents design principles to prevent algebraic attacks, providing assistance for the construction of secure certificateless signature and certificateless aggregate signature schemes against previous and potential attacks.
Article
Physics, Multidisciplinary
Lin Wang, Changgen Peng, Weijie Tan
Summary: Blockchain has unique advantages but also risks of privacy leakage. To address this issue, a secure ring signature scheme based on blockchain is proposed, leveraging distributed key generation and elliptic curve cryptography for higher security and feasibility.
Article
Computer Science, Information Systems
Sujit Sangram Sahoo, Vijay Kumar Chaurasiya
Summary: An aggregate signature is a cost-effective digital signature method that reduces storage costs and bandwidth consumption, making it attractive for various blockchain applications. We propose a pairing-free aggregate signature scheme based on ECDSA, which is computationally efficient and does not require additional parameters and costs for signature aggregation and verification in blockchain applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)