Security in Computing and Communications
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers
Chapter and Conference Paper
In ID-based encryption, the public key of each user is set to be his identity, which greatly reduces the overheads of certificate management. Besides, in some scenarios, encrypting a secret message for differe...
Book and Conference Proceedings
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers
Chapter and Conference Paper
With 5G Network Slicing, the 5G telecommunication operators can achieve the goal of supporting users with a variety of different services and can also create a slice with certain unique characteristics. For ex...
Article
As the rising popularity of Bitcoin, people tend to use Bitcoin wallets to manage the keys for spending or receiving funds. Instead of generating randomly pairs of keys, which may need higher space complexity ...
Chapter and Conference Paper
Location-based services have become increasingly more pervasive in the context of Internet of Vehicles. Nowadays, vehicles can transfer their locations to the server for route planning, attractions searching, ...
Chapter and Conference Paper
Recently, Fan et al. proposed the File Transfer Protocol Based on Re-Encryption for Named Data Network (FTP-NDN) in order to reduce the cost that affects simultaneous access of same video services. The authors...
Chapter and Conference Paper
Attribute-based encryption is a very powerful primitive in public-key cryptography. It can be adopted in many applications, such as cloud storage, etc. To further protect the privacy of users, anonymity has be...
Chapter and Conference Paper
Recently, lots of works on power consumption data aggregation have been proposed for the privacy-preservation of users against the operation center in smart grids. This is the user-based data aggregation, which a...
Chapter and Conference Paper
Smart grids have become a future trend due to the development of technology and increased energy demand and consumption. In smart grids, a user’s electricity consumption is recorded by their smart meters, and ...
Chapter
After Chaum introduced the concept of anonymous credential systems, a number of similar systems have been proposed; however, these systems use zero-knowledge protocols to authenticate users resulting in ineff...
Book and Conference Proceedings
5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings
Article
Smart grid is an advanced electrical grid equipped with communication capability, which are utilized to improve the efficiency, reliability, and sustainability of electricity services. It often integrates itse...
Book and Conference Proceedings
International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings
Chapter and Conference Paper
Cloud computing brings novel concepts and various applications for people to use computer on theInternet, where all of above-mentioned concern with user authentication. Password is the most popular approach fo...
Chapter and Conference Paper
Membership revocation, being an important property for applications of group signatures, represents a bottleneck in today’s schemes. Most revocation methods require linear amount of work to be performed by unr...
Chapter and Conference Paper
Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mo...
Chapter
Fair electronic voting makes it possible for the contents of all cast votes will not be known until all votes are cast. In addition, in an anonymous electronic cash system, it is usually necessary for a cash o...
Chapter and Conference Paper
In this paper, we propose a multi-recastable ticket scheme for electronic elections based on blind signatures. In our election scheme, every voter of a group can obtain an m-castable ticket (m-ticket). Through th...