Article
Mathematics
Vaishnavi Nagaraja, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nurul Nur Hanisah Adenan, Ji-Jian Chin, Sook-Chin Yip, Timothy Tzen Vun Yap
Summary: This paper introduces an identification protocol, namely the RankID scheme, and points out its issues and security flaws. Then, a more natural approach to construct the rank version of the AGS identification protocol is proposed, showing how our construction overcomes the security flaws in the RankID scheme. Our proposal achieves better results in terms of public key size, secret key size, and signature size compared to existing identification schemes such as Rank RVDC and Rank CVE schemes. Our proposal also achieves a reduction of 90%, 50%, and 96% in signature size, secret key size, and public key size, respectively, compared to the Rank CVE signature scheme.
Article
Telecommunications
Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
Summary: The paper critiques the recent attempt by Li, Xing, and Yeo to produce a code-based signature scheme using the Schnorr-Lyubashevsky approach and verifies its effectiveness through numerical simulations. The new scheme uses rejection sampling and dense noise vectors to hide the secret key structure in produced signatures, but ultimately fails to protect the secret key. A strong correlation between signatures leaks information about the secret key, leading to a key recovery attack that can recover the secret key after observing multiple signatures. Ultimately, the scheme may only be secure for one-time usage.
IEEE COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Information Systems
Meryem Soysaldi Sahin, Sedat Akleylek
Summary: This paper proposes a new constant-size and partially-dynamic group signature scheme based on lattice assumptions. Multiple cryptographic schemes are combined, and the security is analyzed in the quantum random oracle model.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Sedat Akleylek, Meryem Soysaldi, Wai-Kong Lee, Seong Oun Hwang, Denis Chee-Keong Wong
Summary: The Internet of Things (IoT) technology enables many innovative applications but requires protection from cyber attacks. The proposed new signature scheme based on polynomials is resistant to quantum computer attacks and enables efficient authentication of edge nodes.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Multidisciplinary Sciences
Lijing Ren, Denghui Zhang
Summary: This paper presents a novel QR code-based expansion-free and meaningful visual cryptography scheme (QEVCS) that can effectively protect the privacy of images without requiring any computation.
SCIENTIFIC REPORTS
(2022)
Article
Computer Science, Information Systems
Chaoyang Li, Yuan Tian, Xiubo Chen, Jian Li
Summary: In this paper, an anti-quantum blind signature scheme based on the lattice assumption has been proposed to enhance security and efficiency in blockchain systems, combining lattice cryptography and blind signature technology. The proposed scheme meets the properties of blindness and one-more unforgeability while proving to be safe in the random oracle model. The efficiency analysis and comparison results show that the proposed scheme is more efficient and has a more stable signature size compared to similar literature and other cryptosystems.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Kyung-Ah Shim, Youngjoo An
Summary: Blind signature allows users to obtain signatures on any message from an authority without information on the message, while blind ring signature scheme enables group members to sign messages anonymously. Vulnerabilities in blind signature schemes stem from exposure of blinding factors in specific algebraic relations in underlying rings, which can be mitigated by using homomorphic encryption schemes.
Article
Computer Science, Information Systems
Lunzhi Deng, Tao Wang, Shuai Feng, Yunyun Qu, Siwei Li
Summary: Safe and efficient collection of users' electronic consumption data is a basic function of the smart grid, and anonymous aggregate signature is a fine option to realize this feature. This article proposes an identity-based designated verifier anonymous aggregate signature scheme for smart grids, ensuring the validity of signatures without revealing signers' identities. The scheme requires fewer pairing operations and has lower calculation cost compared to other schemes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Meryem Soysaldi Sahin, Sedat Akleylek
Summary: This paper reviews lattice-based group signature schemes, classifying them into four categories: static, group signature schemes with revocation mechanism, partially dynamic, and fully dynamic. The main contribution of this study is a detailed examination of lattice-based group signature schemes.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2023)
Article
Quantum Science & Technology
Fang Ye, Zitao Zhou, Yibing Li
Summary: The Internet of things (IoT) devices are vulnerable to attacks due to lack of trust and coordination mechanisms. Blockchain provides low-cost credible communication for IoT nodes. However, traditional digital signature algorithms are not secure enough against quantum computing attacks. Therefore, we propose a quantum-assisted blockchain of things (QBoT) based on quantum signature to protect IoT systems and ensure secure communication between nodes.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Computer Science, Hardware & Architecture
Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo
Summary: This paper presents a new code-based blind signature (CBBS) scheme as an alternative to traditional number-theoretic based schemes. The security of the CBBS scheme relies on the hardness of the syndrome decoding problem in coding theory, making it resistant to quantum attacks. This scheme uses a zero-knowledge protocol with a lower cheating probability, resulting in higher efficiency compared to other schemes.
Article
Physics, Multidisciplinary
Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
Summary: The paper introduces a new lattice-based two-party signature scheme DiLizium, which allows for more efficient implementation while still ensuring post-quantum security, and provides a security proof against classical adversaries.
Article
Chemistry, Analytical
Piyush Kumar Shukla, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, Sajjad Shaukat Jamal
Summary: This article evaluates the security and efficiency of white-box cryptographic implementations. It explores practical applications and analyzes the theoretical foundations of these implementations. A new definition of white-box cryptography is proposed, along with a theoretical model. Possible future applications of white-box cryptography technology are also discussed.
Article
Engineering, Electrical & Electronic
Vikas Srivastava, Sumit Kumar Debnath, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz
Summary: Deployed vehicles in IoV make intelligent decisions by exchanging real-time traffic information, reducing traffic congestion and accidents. A new identity-based multivariate MSS (MV-MSS) is proposed based on the intractability of the multivariate-quadratic (MQ) problem, providing a secure and efficient signing scheme. The MV-MSS is proven to be efficient and secure in IoV application, utilizing fast and post-quantum safe primitives of multivariate public key cryptosystems.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Mathematics
Adel Alahmadi, Selda calkavur, Patrick Sole, Abdul Nadim Khan, Mohd Arif Raza, Vaneet Aggarwal
Summary: Blockchain is an unchangeable and secure method of recording information. It uses a notebook that copies and processes procedures across a network of computers. This paper introduces a new digital signature scheme based on error correcting codes, which improves performance by working in a wider space.
Article
Computer Science, Information Systems
Victor Mateu, Josep M. Miret, Francesc Sebe
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2016)
Article
Computer Science, Hardware & Architecture
Victor Mateu, Francesc Sebe, Magda Valls
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2014)
Article
Chemistry, Analytical
Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi
Summary: The evolution of 5G and 6G networks has enhanced the capabilities of IoT devices, but current authentication protocols lack the ability to achieve immediate and continuous authentication, scalability, and cybersecurity. This paper proposes a new hybrid protocol called Hybrid TLI-mu TESLA, which combines the advantages of previous protocols and solves various authentication problems. Simulation analysis and comparisons demonstrate the superiority of the proposed protocol in terms of authentication, scalability, cybersecurity, and compatibility with 5G and 6G IoT generations.
Article
Computer Science, Information Systems
Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, Yousof Al-Hammadi
Summary: This paper presents a novel continuous and low-overhead broadcast authentication protocol, enhanced Inf-TESLA, which outperforms the original TESLA protocol in terms of time complexity and critical authentication processes.
Proceedings Paper
Computer Science, Hardware & Architecture
Sanjay Deshpande, Santos Merino del Pozo, Victor Mateu, Marc Manzano, Najwa Aaraj, Jakub Szefer
Summary: This paper presents the first FPGA-based hardware design for computing the multiplicative inverse using a fast constant-time GCD algorithm. The proposed designs are compact, parameterizable, and outperform existing software and hardware implementations, making them more appealing for designing new cryptosystems.
2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021)
(2021)
Proceedings Paper
Computer Science, Hardware & Architecture
Emanuele Bellini, Florian Caullery, Rusydi Makarim, Marc Manzano, Chiara Marcolla, Victor Mateu
2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019)
(2019)
Proceedings Paper
Computer Science, Information Systems
Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu
2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)
(2019)
Proceedings Paper
Computer Science, Information Systems
Victor Mateu, Magda Valls
ELECTRONIC GOVERNMENT AND THE INFORMATION SYSTEMS PERSPECTIVE (EGOVIS 2017)
(2017)
Proceedings Paper
Computer Science, Information Systems
Victor Mateu, Francesc Sebe, Magda Valls
PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS
(2013)