aggregate signatures
Recently Published Documents


TOTAL DOCUMENTS

65
(FIVE YEARS 4)

H-INDEX

15
(FIVE YEARS 0)

2021 ◽  
Vol 30 (5) ◽  
pp. 885-894
Author(s):  
ZHAI Jiaqi ◽  
LIU Jian ◽  
CHEN Lusheng
Keyword(s):  

2021 ◽  
Vol 27 (1) ◽  
pp. 83-99
Author(s):  
Jinhua Fu ◽  
Wenhui Zhou ◽  
Mixue Xu ◽  
Xueming Si ◽  
Chao Yuan ◽  
...  

Existing blockchains, especially public blockchains, face the challenges of scalability which means the processing capacity will not get better with the addition of nodes, making it somewhat infeasible for mobile computing applications. Some improved technologies are known to speed up processing capacity by shrinking the consensus group, increasing the block capacity and/or shortening the block interval. Even these solutions are met with major problems such as storage limitations and weak security. To face the realistic application scenarios for blockchain technology in the mobile realm, we propose a new public blockchain designed based on sharding, aggregate signature and cryptographic sortition which we call SAC. In SAC, the transaction rate increases with the number of shards while the length of the consensus signature is a constant. Meanwhile, in SAC, the assignment of consensus representatives is controlled by a verifiable random function, which can effectively solve the problem of centralized consensus. In addition, this paper analyzes the performance of SAC to give adequate comparison with other sharding technologies while also giving a rational security analysis. Our experimental results clearly show the potential applicability of this novel blockchain protocol to in mobile computation.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Jeonghyuk Lee ◽  
Jihye Kim ◽  
Hyunok Oh
Keyword(s):  

Author(s):  
Kaoru Takemure ◽  
Yusuke Sakai ◽  
Bagus Santoso ◽  
Goichiro Hanaoka ◽  
Kazuo Ohta
Keyword(s):  

2019 ◽  
Vol 2019 ◽  
pp. 1-5 ◽  
Author(s):  
Yu Zhan ◽  
Baocang Wang

Certificateless aggregate signatures aggregate n signatures from n different users into one signature. Therefore, a verifier can judge whether all signatures are valid by verifying once. With this advantage, certificateless aggregate signatures are widely used in the environment of limited computing resources. Recently, a novel certificateless aggregate signature scheme was proposed by Kumar et al. This scheme’s security was claimed to be secure against two types of attackers under the random oracle model. In this paper, we indicate that their scheme is unable to achieve this security goal. We show an attack algorithm that the second type of attacker could forge a valid signature under an identity without the private key of the target user. Moreover, we demonstrate that the second type of attacker could forge a valid aggregate signature.


2019 ◽  
Vol 62 (4) ◽  
pp. 481-489
Author(s):  
Gaoli Wang ◽  
Zhenfu Cao ◽  
Xiaolei Dong

Sign in / Sign up

Export Citation Format

Share Document