-
Chapter and Conference Paper
Lattice-Based Anonymous Multi-Receiver ID-Based Encryption
In ID-based encryption, the public key of each user is set to be his identity, which greatly reduces the overheads of certificate management. Besides, in some scenarios, encrypting a secret message for differe...
-
Chapter and Conference Paper
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments
With 5G Network Slicing, the 5G telecommunication operators can achieve the goal of supporting users with a variety of different services and can also create a slice with certain unique characteristics. For ex...
-
Chapter and Conference Paper
An Effective Target Recovery Method from a Source Location in Geo-Indistinguishable Surroundings
Location-based services have become increasingly more pervasive in the context of Internet of Vehicles. Nowadays, vehicles can transfer their locations to the server for route planning, attractions searching, ...
-
Chapter and Conference Paper
Enhancement of FTP-NDN Supporting Nondesignated Receivers
Recently, Fan et al. proposed the File Transfer Protocol Based on Re-Encryption for Named Data Network (FTP-NDN) in order to reduce the cost that affects simultaneous access of same video services. The authors...
-
Chapter and Conference Paper
Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme
Attribute-based encryption is a very powerful primitive in public-key cryptography. It can be adopted in many applications, such as cloud storage, etc. To further protect the privacy of users, anonymity has be...
-
Chapter and Conference Paper
Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids
Recently, lots of works on power consumption data aggregation have been proposed for the privacy-preservation of users against the operation center in smart grids. This is the user-based data aggregation, which a...
-
Chapter and Conference Paper
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids
Smart grids have become a future trend due to the development of technology and increased energy demand and consumption. In smart grids, a user’s electricity consumption is recorded by their smart meters, and ...
-
Chapter
An Efficient Signature Scheme for Anonymous Credentials
After Chaum introduced the concept of anonymous credential systems, a number of similar systems have been proposed; however, these systems use zero-knowledge protocols to authenticate users resulting in ineff...
-
Chapter and Conference Paper
Active One-Time Password Mechanism for User Authentication
Cloud computing brings novel concepts and various applications for people to use computer on theInternet, where all of above-mentioned concern with user authentication. Password is the most popular approach fo...
-
Chapter and Conference Paper
Group Signature with Constant Revocation Costs for Signers and Verifiers
Membership revocation, being an important property for applications of group signatures, represents a bottleneck in today’s schemes. Most revocation methods require linear amount of work to be performed by unr...
-
Chapter and Conference Paper
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications
Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mo...
-
Chapter
Blind Signatures with Double-Hashed Messages for Fair Electronic Elections and Ownership Claimable Digital Cash
Fair electronic voting makes it possible for the contents of all cast votes will not be known until all votes are cast. In addition, in an anonymous electronic cash system, it is usually necessary for a cash o...
-
Chapter and Conference Paper
A multi-recastable ticket scheme for electronic elections
In this paper, we propose a multi-recastable ticket scheme for electronic elections based on blind signatures. In our election scheme, every voter of a group can obtain an m-castable ticket (m-ticket). Through th...