Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A security credential management system for V2X communications
B Brecht, D Therriault, A Weimerskirch… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The US Department of Transportation (USDOT) issued a proposed rule on January 12, 2017
to mandate vehicle-to-vehicle safety communications in light vehicles in the US …
to mandate vehicle-to-vehicle safety communications in light vehicles in the US …
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
Short group signatures
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …
the size of a standard RSA signature with the same security. Security of our group signature …
[HTML][HTML] A survey on group signatures and ring signatures: Traceability vs. anonymity
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …
and analyzes the existing approaches for their problem: balancing anonymity against …
Dynamic accumulators and application to efficient revocation of anonymous credentials
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …
hash a large set of inputs into one short value, such that there is a short proof that a given …
GSIS: A secure and privacy-preserving protocol for vehicular communications
In this paper, we first identify some unique design requirements in the aspects of security
and privacy preservation for communications between different communication devices in …
and privacy preservation for communications between different communication devices in …
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
This paper provides theoretical foundations for the group signature primitive. We introduce
strong, formal definitions for the core requirements of anonymity and traceability. We then …
strong, formal definitions for the core requirements of anonymity and traceability. We then …
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving
attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is …
attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is …
Accumulators from bilinear pairings and applications
L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
Foundations of group signatures: The case of dynamic groups
M Bellare, H Shi, C Zhang - Cryptographers' track at the RSA conference, 2005 - Springer
Recently, a first step toward establishing foundations for group signatures was taken [5], with
a treatment of the case where the group is static. However the bulk of existing practical …
a treatment of the case where the group is static. However the bulk of existing practical …