Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Compact multi-signatures for smaller blockchains
We construct new multi-signature schemes that provide new functionality. Our schemes are
designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings …
designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings …
Simple schnorr multi-signatures with applications to bitcoin
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …
group of signers to produce a short, joint signature on a common message) called MuSig …
Multi-signatures in the plain public-key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature
on a common document, and has many potential uses. However, existing schemes impose …
on a common document, and has many potential uses. However, existing schemes impose …
Kee** authorities" honest or bust" with decentralized witness cosigning
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …
update services--represent high-value targets for hackers, criminals, and spy agencies …
Short randomizable signatures
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …
development of pairing-based cryptography, several taking advantage of this setting have …
Batch Arguments for and More from Standard Bilinear Group Assumptions
Non-interactive batch arguments for NP provide a way to amortize the cost of NP verification
across multiple instances. They enable a prover to convince a verifier of multiple NP …
across multiple instances. They enable a prover to convince a verifier of multiple NP …
Aggregate message authentication codes
We propose and investigate the notion of aggregate message authentication codes (MACs)
which have the property that multiple MAC tags, computed by (possibly) different senders on …
which have the property that multiple MAC tags, computed by (possibly) different senders on …
On the security of two-round multi-signatures
A multi-signature scheme allows a group of signers to collaboratively sign a message,
creating a single signature that convinces a verifier that every individual signer approved the …
creating a single signature that convinces a verifier that every individual signer approved the …
Secure proxy signature schemes for delegation of signing rights
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …
schemes have been suggested for use in numerous applications, particularly in distributed …