Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

[KNJIGA][B] Advances in elliptic curve cryptography

IF Blake, G Seroussi, NP Smart - 2005 - books.google.com
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999
there has been tremendous progress in the field. In some topics, particularly point counting …

Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

Certificateless signature and proxy signature schemes from bilinear pairings

X Li, K Chen, L Sun - Lithuanian Mathematical Journal, 2005 - Springer
Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring
certificates to guarantee the authenticity of public keys, certificateless public key …

A certificate-based signature scheme

BG Kang, JH Park, SG Hahn - Cryptographers' Track at the RSA …, 2004 - Springer
In this paper, we propose the security notion of certificate-based signature that uses the
same parameters and certificate revocation strategy as the encryption scheme presented at …

Two improved partially blind signature schemes from bilinear pairings

SSM Chow, LCK Hui, SM Yiu, KP Chow - … , July 4-6, 2005. Proceedings 10, 2005 - Springer
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the
signer can neither learn the messages he/she sign nor the signatures the recipients obtain …

A survey of ring signature

L Wang, G Zhang, C Ma - Frontiers of Electrical and Electronic Engineering …, 2008 - Springer
Ring signature allows specifying a set of possible signers without revealing which member
actually produces the signature. This concept was first formalized in 2001 by Rivest, Shamir …

ID-based ring signature and proxy ring signature schemes from bilinear pairings

AK Awasthi, S Lal - arxiv preprint cs/0504097, 2005 - arxiv.org
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a
simplified group signature without any manager. It protects the anonymity of a signer. The …

A short linearly homomorphic proxy signature scheme

Q Lin, J Li, Z Huang, W Chen, J Shen - Ieee Access, 2018 - ieeexplore.ieee.org
Linearly homomorphic signature schemes allow the performance of linear computations on
authenticated data. They are important primitives for many applications, such as electronic …

Identity based threshold ring signature

SSM Chow, LCK Hui, SM Yiu - … Security and Cryptology–ICISC 2004: 7th …, 2005 - Springer
In threshold ring signature schemes, any group of t entities spontaneously conscript
arbitrarily n–t entities to generate a publicly verifiable t-out-of-n signature on behalf of the …