2017
DOI: 10.1016/j.jksuci.2015.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based key-insulated aggregate signature scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The storage cost is minimal due to this compression feature. The method of full aggregation is supported by the identity called “Public‐Key” where the users can perform aggregation freely on different messages in “Public Key Infrastructure (PKI).” 28,29 The IBAS is more secure against powerful attacks. “Signing” and “Verification” play a major role in IBAS.…”
Section: Methodologiesmentioning
confidence: 99%
“…The storage cost is minimal due to this compression feature. The method of full aggregation is supported by the identity called “Public‐Key” where the users can perform aggregation freely on different messages in “Public Key Infrastructure (PKI).” 28,29 The IBAS is more secure against powerful attacks. “Signing” and “Verification” play a major role in IBAS.…”
Section: Methodologiesmentioning
confidence: 99%
“…This advantage makes SM2-KI-SIGN scheme more suitable for untrusted channels in IIoT-cloud computing environment. At the same time, we show a cost comparison of SM2-KI-SIGN with other schemes [26][27][28][29] in Fig. 3.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…It solves the problem of aggregate signature using intersection method. Reddy and Gopal [5] proposed a scheme for data security and sharing of data with aggregate signature scheme using identity-based keys. Cui et al [6] proposed a key aggregate searchable encryption scheme for cloud computing.…”
Section: Related Workmentioning
confidence: 99%