Article
Mathematics
P. Thanalakshmi, R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi, Changho Seo
Summary: This paper presents a hash-based multi-time designated verifier signature scheme that ensures signer anonymity and resists chosen message attacks, while investigating properties such as non-transferability and non-delegatability.
Article
Chemistry, Analytical
P. Thanalakshmi, R. Anitha, N. Anbazhagan, Woong Cho, Gyanendra Prasad Joshi, Eunmok Yang
Summary: The chameleon signature system, based on a hash then sign model, addresses the inadequacy of standard digital signatures for personal or economically sensitive applications. The system allows the holder of a chameleon signature to compute a message digest collision through a chameleon hash function and trapdoor information, ensuring privacy and non-disclosure to third parties. Additionally, the proposed quantum secure chameleon signature scheme based on hash functions provides a promising alternative to number theoretic-based methods, satisfying security requirements such as semantic security, non-transferability, and unforgeability without exposing keys.
Article
Computer Science, Information Systems
Xiwei Shan, Lin You, Gengran Hu
Summary: This paper proposes two novel constructions for biometric-based signature in identity-based setting over elliptic curve groups, BioFIBS and Bio-IBS, which integrate elliptic curve cryptography technique with biometric-based IBS for more efficient and practical execution. The schemes satisfy security requirements in the random oracle model against adaptively chosen message and identity attack under computational Diffie-Hellman assumption.
Article
Engineering, Chemical
Adel A. Ahmed, Omar M. Barukab
Summary: Cybersecurity protocols provide protection against cyberattacks that target network devices, platform programs, and network applications. In the context of IoT, cybersecurity challenges such as compromised devices, data/service protection, and identifying impacted users need to be addressed. This paper proposes a lightweight encryption mechanism that integrates an unforgeable digital signature, which utilizes secure key distribution and resolves weaknesses in shared secret keys. The mechanism combines digital signature and encryption, and utilizes fast hash functions for secure key exchange in IoT devices.
Article
Computer Science, Information Systems
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao
Summary: With the rapid development of electronic information technology, digital signatures have become essential in our lives, but face challenges from quantum computing. Post-quantum cryptography research is necessary. This research proposes an IBS scheme based on lattices, which has advantages in computational complexity and security compared to other efficient schemes.
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING
(2021)
Article
Computer Science, Information Systems
P. Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri
Summary: Public Key Cryptosystem (PKC) relies on the security of the user's private key, and exposure of the private key can lead to disastrous situations. To address this issue, a key-insulation mechanism was introduced. Identity-based cryptosystems alleviate certificate management issues in traditional PKC and a pairing-free key insulated signature scheme in identity-based setting has been proposed to improve efficiency and resist private key exposure.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Engineering, Multidisciplinary
Yanan Chen, Ting Yao, Haiping Ren, Zehao Gan
Summary: The introduction of the electronic medical record (EHR) sharing system has greatly contributed to the management and sharing of healthcare data. This paper proposes a proxy re-signature (PRS) scheme that addresses the forward and backward security issues in existing schemes. The scheme provides key-insulated property and ensures unforgeability based on the extended Computational Diffie-Hellman assumption in the random oracle model.
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES
(2022)
Article
Mathematical & Computational Biology
Xiaodong Yang, Haoqi Wen, Lei Liu, Ningning Ren, Caifen Wang
Summary: The Internet of Things (IoT) is gradually entering our lives and promoting the transformation of society. Certificateless signature (CLS) is an effective method for verifying data in the IoT environment. However, most CLS schemes rely on ideal random oracles, which do not guarantee real-world security. In this paper, we analyze Shim's CLS scheme and demonstrate its vulnerability to public key replacement attacks. We propose a blockchain-based CLS scheme without a random oracle to improve security and prevent signature forgery.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
Dariush Abbasinezhad-Mood, Sayyed Majid Mazinani, Morteza Nikooghadam, Arezou Ostad-Sharif
Summary: This article introduces a security-enhanced anonymous DIDAKA protocol, which addresses the security weaknesses of existing schemes and offers better execution time compared to previous proposals.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
ShuangGen Liu, Yu Zhu, RuiYun Wang
Summary: This paper proposes a new certificateless blind signature scheme and an improved power request system model to protect users' privacy in the smart grid, addressing the issue of malicious attacks.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Physics, Multidisciplinary
Xin Xu, Ai-Han Yin
Summary: Quantum multi-signature, often combined with other quantum signatures, heavily relies on shared classical secret keys for signature generation and verification. To improve reliability, we propose a quantum homomorphic multi-signature protocol that applies homomorphic aggregation and entanglement swapping. This protocol utilizes the homomorphic property to complete signature generation and verification, aggregating individual signatures into a new multi-signature and verifying the signature with a shared secret key. The homomorphic property enhances signature reliability.
Article
Computer Science, Information Systems
Shuang Gen Liu, Ru Liu, Si Yuan Rao
Summary: The smart home often suffers from poor security due to the limitations of embedded processors. To enhance the communication security of smart home systems, this paper proposes a two-party collaborative signature scheme based on the SM9 algorithm to reduce the risk of signature private key leakage.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Mathematics, Applied
P. Thanalakshmi, N. Anbazhagan, Gyanendra Prasad Joshi, Eunmok Yang
Summary: Steinfeld et al. introduced the concept of Universal Designated Verifier Signature (UDVS) to ensure the designated person can verify the signer's signature on the message. Baek et al. proposed Universal Designated Verifier Signature Proof (UDVSP) that does not require the verifier's public key for verification. Existing UDVSP constructions are based on a vulnerable discrete logarithm problem, but an efficient quantum resistant UDVSP is suggested by NIST reports.
Article
Computer Science, Information Systems
Shuanggen Liu, Kang Chen, Zikang Liu, Teng Wang
Summary: This article improves the security of the SM9 algorithm by proposing an approach based on multiple KGCs and introducing a new threshold ring signature scheme combining SM9. Both schemes have advantages in security and extend the application scenarios of SM9, playing a positive role in the promotion of the algorithm.
Article
Computer Science, Information Systems
Gayathri Nemani Bhagya, Gowri Thumbur, Krishna Rao Ravva Rama Venkata, Punugu Vasudeva Reddy
Summary: This paper proposes a pairing-free certificateless directed signature scheme to improve computational and communication efficiency, which is proven secure in the random oracle model. Efficiency analysis shows that the proposed scheme is more efficient compared to existing schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2021)
Article
Computer Science, Software Engineering
Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2019)
Article
Computer Science, Hardware & Architecture
Tong Li, Zhengan Huang, Ping Li, Zheli Liu, Chunfu Jia
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2018)
Article
Computer Science, Hardware & Architecture
Li Yang, Ziyi Han, Zhengan Huang, Jianfeng Ma
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2018)
Article
Computer Science, Artificial Intelligence
Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen
Article
Computer Science, Theory & Methods
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
DESIGNS CODES AND CRYPTOGRAPHY
(2019)
Article
Computer Science, Information Systems
Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang
INFORMATION SCIENCES
(2019)
Article
Computer Science, Information Systems
Zhengan Huang, Junzuo Lai, Wenbin Chen, Muhammad Raees-ul-Haq, Liaoliang Jiang
INFORMATION SCIENCES
(2019)
Article
Computer Science, Theory & Methods
Jing Li, Xianmin Wang, Zhengan Huang, Licheng Wang, Yang Xiang
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2019)
Article
Computer Science, Theory & Methods
Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao
THEORETICAL COMPUTER SCIENCE
(2020)
Article
Computer Science, Hardware & Architecture
Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siuming Yiu, Zoe L. Jiang
Summary: This paper discusses proxy re-signature schemes, introduces different types of schemes, and proposes the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme based on lattice, proving their security in the random oracle model.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2021)
Article
Computer Science, Information Systems
Ye Li, Zoe L. Jiang, Lin Yao, Xuan Wang, S. M. Yiu, Zhengan Huang
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2019)
Proceedings Paper
Computer Science, Theory & Methods
Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I
(2018)
Article
Computer Science, Information Systems
Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, Kai Chen
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2018)