Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
Blockchain and distributed ledger technologies have received significant interest in various
areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …
areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …
Consensus mechanisms and information security technologies
Abstract Distributed Ledger Technology (DLT) helps maintain and distribute predefined
types of information and data in a decentralized manner. It removes the reliance on a third …
types of information and data in a decentralized manner. It removes the reliance on a third …
Threshold and multi-signature schemes from linear hash functions
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …
for which security relies solely on either the hardness of the (plain) discrete logarithm …
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct new multiparty signature schemes that allow multiple signers to sequentially
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
produce a compact, fixed-length signature simultaneously attesting to the message (s) they …
IdenMultiSig: Identity-based decentralized multi-signature in internet of things
Most devices in the Internet of Things (IoT) work on unsafe networks and are constrained by
limited computing, power, and storage resources. Since the existing centralized signature …
limited computing, power, and storage resources. Since the existing centralized signature …
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Digital signature is a major component of transactions on Blockchain platforms, especially in
enterprise Blockchain platforms, where multiple signatures from a set of peers need to be …
enterprise Blockchain platforms, where multiple signatures from a set of peers need to be …
A privacy-aware PKI system based on permissioned blockchains
Public key infrastructure (PKI) is the foundation and core of network security construction.
Blockchain (BC) has many technical characteristics, such as decentralization, impossibility …
Blockchain (BC) has many technical characteristics, such as decentralization, impossibility …
Locally verifiable signature and key aggregation
Abstract Aggregate signatures (Boneh, Gentry, Lynn, Shacham, Eurocrypt 2003) enable
compressing a set of N signatures on N different messages into a short aggregate signature …
compressing a set of N signatures on N different messages into a short aggregate signature …
An efficient lattice-based multisignature scheme with applications to bitcoins
R El Bansarkhani, J Sturm - … , CANS 2016, Milan, Italy, November 14-16 …, 2016 - Springer
Multisignature schemes constitute important primitives when it comes to save the storage
and bandwidth costs in presence of multiple signers. Such constructions are extensively …
and bandwidth costs in presence of multiple signers. Such constructions are extensively …