Short Signatures from the Weil Pairing
Dan Boneh,Ben Lynn,Hovav Shacham +2 more
- pp 514-532
TLDR
A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.Abstract:
We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves. The signature length is half the size of a DSA signature for a similar level of security. Our short signature scheme is designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.read more
Citations
More filters
Journal ArticleDOI
EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks
Albert Wasef,Xuemin Shen +1 more
TL;DR: The proposed EDR protocol improves the safety levels in VANETs as it diminishes the revocation vulnerability window existing in conventional certificate revocation lists (CRLs).
Proceedings ArticleDOI
Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks
Albert Wasef,Xuemin Shen +1 more
TL;DR: The proposed scheme can mitigate the effect of the heavy security overhead by batch group signature verification by enabling vehicles to verify a large number of messages in a timely manner, and improves the system performance in terms of the message loss ratio.
Proceedings ArticleDOI
Revocation games in ephemeral networks
TL;DR: This paper defines a game-theoretic model to analyze the various local revocation strategies and establishes and proves the conditions leading to subgame-perfect equilibria, and derives the optimal parameters for voting-based schemes.
Posted ContentDOI
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Amit K. Awasthi,Sunder Lal +1 more
TL;DR: A ring signature is a simplified group signature without any manager. as mentioned in this paper proposed a ring signature scheme based on RSA cryptosystem and certificate based public key setting, which is more efficient than existing ring signature schemes.
Journal ArticleDOI
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
TL;DR: This paper formalizes the system model and the security model for this new primitive, and describes a concrete construction of attribute-based cloud data integrity auditing protocol, which offers desirable properties namely attribute privacy-preserving and collusion-resistance.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI
Random oracles are practical: a paradigm for designing efficient protocols
Mihir Bellare,Phillip Rogaway +1 more
TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book
The Arithmetic of Elliptic Curves
TL;DR: It is shown here how Elliptic Curves over Finite Fields, Local Fields, and Global Fields affect the geometry of the elliptic curves.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.