The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital signature is an important authentication technique. Most of digital signature schemes don't satisfy strong unforgeability and only are proven secure in the random oracle model. It is a challenge to construct an ID-based digital signature scheme with strong unforgeability in the standard model. To overcome this problem, in this paper, we propose a strongly unforgeable identity-based signature...
ID-based cryptography is an important cryptographic system. Recently, by combining RSA and Fiat-Shamir identity authentication scheme, an ID-based one-off Blind public key was proposed to protect user's privacy in, and the authors claimed that the scheme had anonymity and unforgeability. In this paper, we give security analysis to the scheme of, and show this scheme has linkability and universal forgery...
Anonymous technology is an important identity protection technology, it can realize the privacy-preserving of the user. As two important cryptographic technologies, blind signature and ring signature can realize anonymity, thus, they play very important roles in realizing the anonymity of user's information. To fit with the requirement in real life, we propose a blind ring signature scheme by combining...
At present, to access to email account or bank account, a network user has to remember the registered account number of the user and the corresponding password for every service with which they are registered. However, when multiple systems are involved, the user is then required to authenticate to each system individually and repeatedly. It results in inconvenience to each authentication. Recently,...
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with...
Due to the unique characteristics of Cyber-Physical Systems (CPS) such as interaction with the physical world, many new research challenges arise. Many CPS applications will be implemented on computing devices using mobile ad hoc networks (MANETs). Before these systems can be used in multifarious environments, the security properties of these networks must be fully understood. Recently, several secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.