SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

jPBC: Java pairing based cryptography

A De Caro, V Iovino - 2011 IEEE symposium on computers and …, 2011 - ieeexplore.ieee.org
It has been recently discovered that some cyclic groups that could be used in Cryptography
admit a special bilinear pairing map that introduces extra structure to the group. Bilinear …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - Annual international cryptology conference, 2001 - Springer
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …

Short signatures from the Weil pairing

D Boneh, B Lynn, H Shacham - International conference on the theory and …, 2001 - Springer
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …

A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing

S Basudan, X Lin… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
In the recent past, great attention has been directed toward road surface condition
monitoring. As a matter of fact, this activity is of critical importance in transportation …

Aggregate and verifiably encrypted signatures from bilinear maps

D Boneh, C Gentry, B Lynn, H Shacham - … Warsaw, Poland, May 4–8, 2003 …, 2003 - Springer
An aggregate signature scheme is a digital signature that supports aggregation: Given n
signatures on n distinct messages from n distinct users, it is possible to aggregate all these …

Identity-based encryption from the Weil pairing

D Boneh, M Franklin - SIAM journal on computing, 2003 - SIAM
We propose a fully functional identity-based encryption (IBE) scheme. The scheme has
chosen ciphertext security in the random oracle model assuming a variant of the …

Short group signatures

D Boneh, X Boyen, H Shacham - Annual international cryptology …, 2004 - Springer
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …

A comprehensive survey on certificateless aggregate signature in vehicular ad hoc networks

EF Cahyadi, MS Hwang - IETE Technical Review, 2022 - Taylor & Francis
Research related to the authentication schemes in vehicular ad hoc networks (VANETs) has
received significant attention recently. They substantially impact the security and privacy …

Achieving secure role-based access control on encrypted data in cloud storage

L Zhou, V Varadharajan… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
With the rapid developments occurring in cloud computing and services, there has been a
growing trend to use the cloud for large-scale data storage. This has raised the important …