2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI: 10.1109/aina.2016.99
|View full text |Cite
|
Sign up to set email alerts
|

Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Hashimoto and Ogata [6] proposed the frst unrestricted and compact aggregated signature scheme, in which the signature size is constant, and the generated pair signatures can have diferent information states and can aggregate any combination of signatures. Iwasaki et al [7] extended from the two perspectives of structured signature and identitybased signature and constructed an identity-based structured aggregated signature scheme, and the security of the scheme will not be reduced due to the ability of the adversary. It can successfully defend against switching attacks (CCS 2007, Boldyreva et al [8]) and reordering attacks (ISPEC 2007, Shao [9]).…”
Section: Related Workmentioning
confidence: 99%
“…Hashimoto and Ogata [6] proposed the frst unrestricted and compact aggregated signature scheme, in which the signature size is constant, and the generated pair signatures can have diferent information states and can aggregate any combination of signatures. Iwasaki et al [7] extended from the two perspectives of structured signature and identitybased signature and constructed an identity-based structured aggregated signature scheme, and the security of the scheme will not be reduced due to the ability of the adversary. It can successfully defend against switching attacks (CCS 2007, Boldyreva et al [8]) and reordering attacks (ISPEC 2007, Shao [9]).…”
Section: Related Workmentioning
confidence: 99%
“…Definition 3 (Computation Diffie-Hellman Assumption [22]): Let us random choose a, b ∈ Z * q , compute g ab based on a predefined triple couple (g, g a , g b ). [22]): Let us random choose a, b, c ∈ Z * q , R ∈ G 2 , and judge whether equation e(g, g) abc = R is valid or not based on a preset triple couple (g, g a , g b , g c , R).…”
Section: ) Development Of Abementioning
confidence: 99%
“…2) Searchable asymmetric encryption (SAE): SAE is suitable for one-to-many data sharing scenarios based on public key encryption systems. Its security is based on different assumptions, such as, Decision Bilinear Diffie-Hellman (DBDH) [22]. Because SAE scheme is usually inefficient based on bilinear pairings, which leads to high complexity of the algorithm, because of the separation of public key and private key, it still very suitable for multi-user data sharing system.…”
Section: ) Encryptionmentioning
confidence: 99%
“…. ( 1 , 2 , ⋅ ⋅ ⋅ , ( −1) ) do not lie in the common (t-2)-dimensional space, then they can uniquely determine a sphere, described as (5)…”
Section: Implement Algorithm Describedmentioning
confidence: 99%
“…Concerning the basic theory group authentications fall into two categories: based on public key system and not based on public key system. In group authentication based on public key system [3][4][5][6][7], each member makes the individual signature by its private key and delivers its own signature to the aggregator, who is the selected one of group members. After receiving other signatures the aggregator compresses all signatures by the aggregate algorithms.…”
Section: Introductionmentioning
confidence: 99%