S Li, S Zhao, G Min, L Qi, G Liu - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The emerging technologies, such as smart sensors, 5G/6G wireless communication, artificial intelligence, etc., have been maturing the future Internet of Things (IoT) by connecting the …
Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge, however, such emerging edge storage comes with numerous challenging and …
S Kim, DJ Wu - Journal of Cryptology, 2020 - Springer
Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography. Numerous NIZK constructions are known in both the random oracle and the common …
R Tsabary - Theory of Cryptography Conference, 2017 - Springer
Abstract In Attribute-Based Signatures (ABS; first defined by Maji, Prabhakaran and Rosulek, CT-RSA 2011) an authority can generate multiple signing keys, where each key is …
We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct …
R Goyal - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Non-interactive batch arguments (BARGs) let a prover compute a single proof $\pi $ proving validity of abatch'of $ k $$\mathbf {NP} $ statements $ x_1,\ldots, x_ {k} $. The two central …
Homomorphic signatures (HS) allows the derivation of the signature of the message-function pair (m, g), where m= g (m_1, ..., m_K), given the signatures of each of the input messages …
Key-homomorphic properties of cryptographic objects, ie, homomorphisms on their key space, have proven to be useful, both from a theoretical as well as a practical perspective …