Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment

V Srivastava, SK Debnath, B Bera… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The deployed vehicles in an Internet of Vehicles (IoV) can take intelligent decisions by
means of exchanging the real-time traffic-related information between the vehicles and IoV …

An efficient multivariate threshold ring signature scheme

DH Duong, HTN Tran, W Susilo - Computer Standards & Interfaces, 2021 - Elsevier
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with
security reduction to the MQ problem and impersonation probability 2 3. Petzoldt et …

Novel Postquantum MQ-based signature scheme for Internet of things with parallel implementation

S Akleylek, M Soysaldı, WK Lee… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a paradigm shifting technology that enables many innovative
applications in the near future. Proactive measures are required to protect such architecture …

A comprehensive analysis of signature schemes: Towards pairing and non-pairing, taxonomy and future scopes pairing & non-pairing security

R Gaur, S Prakash - … Journal of Computing and Digital Systems, 2023 - journal.uob.edu.bh
The notion of a” Signature scheme” carries possibilities to solve the message and key
security problems. A signature scheme aims to secure the channels, IoT nodes, and …

A multivariate blind ring signature scheme

D Hoang Duong, W Susilo, HTN Tran - The Computer Journal, 2020 - academic.oup.com
Blind signatures are an important and useful tool in designing digital cash schemes and
electronic voting protocols. Ring signatures on the other hand provide the anonymity of the …

A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials

S Akleylek, M Soysaldi - Turkish Journal of Mathematics, 2019 - journals.tubitak.gov.tr
Identification schemes are used to verify identities of parties and signatures. Recently,
systems based on multivariate polynomials have been preferred in identification schemes …

Choosing subfields for LUOV and lifting fields for rainbow

DH Duong, L Van Luyen, HTN Tran - IET Information Security, 2020 - Wiley Online Library
Multivariate public key cryptography is one of the main candidates for post‐quantum
cryptography. Rainbow, an improved (multi‐layer) version of unbalanced oil and vinegar …

A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things

V Srivastava, SK Debnath - The Computer Journal, 2023 - academic.oup.com
Over the last few years, Internet of Medical Things (IoMT) has completely transformed the
healthcare industry. It is bringing out the most notable, and unprecedented impacts on …

An efficient MQ-based signature with tight security proof

H Furue, DH Duong, T Takagi - International Journal of Networking …, 2020 - jstage.jst.go.jp
At PKC 2018, Chen et al. proposed SOFIA, the first MQ-based digital signature scheme
having tight security in the quantum random oracle model (QROM). SOFIA is constructed by …

[HTML][HTML] A novel method for polar form of any degree of multivariate polynomials with applications in iot

S Akleylek, M Soysaldı, DE Boubiche, H Toral-Cruz - Sensors, 2019 - mdpi.com
Identification schemes based on multivariate polynomials have been receiving attraction in
different areas due to the quantum secure property. Identification is one of the most …