Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

S Brotsis, K Limniotis, G Bendiab, N Kolokotronis… - Computer Networks, 2021 - Elsevier
Blockchain and distributed ledger technologies have received significant interest in various
areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …

Consensus mechanisms and information security technologies

P Zhang, DC Schmidt, J White, A Dubey - Advances in Computers, 2019 - Elsevier
Abstract Distributed Ledger Technology (DLT) helps maintain and distribute predefined
types of information and data in a decentralized manner. It removes the reliance on a third …

Threshold and multi-signature schemes from linear hash functions

S Tessaro, C Zhu - Annual International Conference on the Theory and …, 2023 - Springer
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing

A Boldyreva, C Gentry, A O'Neill, DH Yum - Proceedings of the 14th ACM …, 2007 - dl.acm.org
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …

IdenMultiSig: Identity-based decentralized multi-signature in internet of things

H Liu, D Han, M Cui, KC Li, A Souri… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most devices in the Internet of Things (IoT) work on unsafe networks and are constrained by
limited computing, power, and storage resources. Since the existing centralized signature …

Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform

Y **ao, P Zhang, Y Liu - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Digital signature is a major component of transactions on Blockchain platforms, especially in
enterprise Blockchain platforms, where multiple signatures from a set of peers need to be …

A privacy-aware PKI system based on permissioned blockchains

R Wang, J He, C Liu, Q Li, WT Tsai… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
Public key infrastructure (PKI) is the foundation and core of network security construction.
Blockchain (BC) has many technical characteristics, such as decentralization, impossibility …

Locally verifiable signature and key aggregation

R Goyal, V Vaikuntanathan - Annual International Cryptology Conference, 2022 - Springer
Abstract Aggregate signatures (Boneh, Gentry, Lynn, Shacham, Eurocrypt 2003) enable
compressing a set of N signatures on N different messages into a short aggregate signature …

An efficient lattice-based multisignature scheme with applications to bitcoins

R El Bansarkhani, J Sturm - … , CANS 2016, Milan, Italy, November 14-16 …, 2016 - Springer
Multisignature schemes constitute important primitives when it comes to save the storage
and bandwidth costs in presence of multiple signers. Such constructions are extensively …