D Liu, H Wu, J Ni, X Shen - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
In this paper, we propose an efficient and anonymous authentication protocol with a succinct multi-subscription credential (AnMsc) in Space-air-ground integrated vehicular networks …
Data communication is now an inseparable part of our day-to-day life. There are various aspects of data security, and authentication and key agreement are dominating among them …
It is now known that more information can be leaked into the smart grid environment than into the existing environment. In particular, specific information such as energy consumption …
JY Hwang, S Eom, KY Chang, PJ Lee… - Journal of …, 2016 - ieeexplore.ieee.org
In this paper, we consider some aspects of binding properties that bind an anonymous user with messages. According to whether all the messages or some part of the messages are …
S Eom, JH Huh - Advances in Computer Science and Ubiquitous …, 2018 - Springer
Anonymous signature is a method that provides validities of signature while signers are not exposed. Group signature is a method in anonymous signatures that the verifiers can assure …
K Son, DG Han, D Won - IEICE Transactions on Communications, 2015 - search.ieice.org
In this work we propose a two-party anonymous authenticated key exchange protocol that provides a communication binding property. The proposed protocol makes use of a compact …
S Eom, JH Huh - Advances in Computer Science and Ubiquitous …, 2018 - Springer
One of the most important cytological authorization methods to protect privacy is group signature method. Verifiers have limited information of the signers that gives the limited …