L Wang, Y Tian, D Zhang - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
The authentication problem is one of the most significant challenges in the applications of Internet of Things (IoT), and the relationship authentication among smart devices is an …
F Zhu, W Wu, Y Zhang, X Chen - Information sciences, 2019 - Elsevier
Previous solutions on security and privacy in Industrial Internet of Things (IIoT) focus primarily on the data or the deployment and communication problems of devices. However …
H Wu, Z Li, R Song, B Xiao - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
Prior research has introduced a new scenario of blockchain-assisted clouds where the data owner outsources original data to cloud servers and stores some metadata on the …
S Hou, X Huang, JK Liu, J Li, L Xu - Information Sciences, 2015 - Elsevier
In this paper, we propose a new type of digital signatures which is specifically designed for graph-based big data system. The properties of the proposed signatures are twofold. On one …
An order query takes as input a set of elements from a list (ordered sequence) L, and asks for this set to be ordered using the total order induced by L. We introduce two formal models …
S Hou, C Lin, S Yang - Information, 2024 - mdpi.com
A transitive signature scheme enables anyone to obtain the signature on edge (i, k) by combining the signatures on edges (i, j) and (j, k), but it suffers from signature theft and …
We show how to provide privacy-preserving (zero-knowledge) answers to order queries on network data that is organized in lists, trees, and partially-ordered sets of bounded …
F Zhu, Y Zhang, C Lin, W Wu, R Meng - International Conference on …, 2017 - Springer
Abstract A Universal Designated Verifier Transitive Signature (UDVTS UDVTS) scheme is designed for the graph-based big data system. Specifically, it allows a transitive signature …
C Lin, W Wu, X Huang, L Xu - Journal of Computer and System Sciences, 2017 - Elsevier
We propose a new design of universal designated verifier transitive signatures, to authenticate dynamically growing big graph data. The scheme is built on the classical RSA …