Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Compact multi-signatures for smaller blockchains

D Boneh, M Drijvers, G Neven - … Conference on the Theory and Application …, 2018 - Springer
We construct new multi-signature schemes that provide new functionality. Our schemes are
designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings …

Simple schnorr multi-signatures with applications to bitcoin

G Maxwell, A Poelstra, Y Seurin, P Wuille - Designs, Codes and …, 2019 - Springer
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …

Multi-signatures in the plain public-key model and a general forking lemma

M Bellare, G Neven - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
A multi-signature scheme enables a group of signers to produce a compact, joint signature
on a common document, and has many potential uses. However, existing schemes impose …

Kee** authorities" honest or bust" with decentralized witness cosigning

E Syta, I Tamas, D Visher, DI Wolinsky… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …

Short randomizable signatures

D Pointcheval, O Sanders - Topics in Cryptology-CT-RSA 2016: The …, 2016 - Springer
Digital signature is a fundamental primitive with numerous applications. Following the
development of pairing-based cryptography, several taking advantage of this setting have …

Batch Arguments for  and More from Standard Bilinear Group Assumptions

B Waters, DJ Wu - Annual International Cryptology Conference, 2022 - Springer
Non-interactive batch arguments for NP provide a way to amortize the cost of NP verification
across multiple instances. They enable a prover to convince a verifier of multiple NP …

Aggregate message authentication codes

J Katz, AY Lindell - Cryptographers' Track at the RSA Conference, 2008 - Springer
We propose and investigate the notion of aggregate message authentication codes (MACs)
which have the property that multiple MAC tags, computed by (possibly) different senders on …

On the security of two-round multi-signatures

M Drijvers, K Edalatnejad, B Ford, E Kiltz… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
A multi-signature scheme allows a group of signers to collaboratively sign a message,
creating a single signature that convinces a verifier that every individual signer approved the …

Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …