skip to main content
Volume 12, Issue 3May 2018
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
EISSN:1751-8717
Reflects downloads up to 02 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Efficient unlinkable sanitizable signatures from signatures with re‐randomizable keys

A sanitizable signature scheme is a malleable signature scheme where a designated third party has the permission to modify certain parts of the message and adapt the signature accordingly. This primitive was introduced by Ateniese et al. (ESORICS 2005) ...

research-article
Practical attribute‐based signature schemes for circuits from bilinear map

Attribute‐based signatures allow us to sign anonymously, in such a way that the signature proves that the signer's attributes satisfy some predicate, but it hides any other information on the signer's attributes beyond that fact. As well as any ...

research-article
Delegatable functional signatures

The authors introduce delegatable functional signatures (DFS) which support the delegation of signing capabilities to another party, called the evaluator, with respect to a functionality F. In a DFS, the signer of a message can choose an evaluator, ...

research-article
Receiver‐ and sender‐deniable functional encryption

Deniable encryption, first introduced by Canetti et al. 1997, allows equivocation of encrypted communication. In this work, the authors generalise its study to functional encryption (FE). The authors’ results are summarised as follows: They first put ...

research-article
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models

Invalid curve attacks are a well known attack class targeting elliptic curve arithmetic implementations. In such attacks, the adversary tricks the cryptographic device into carrying out scalar multiplications on a weaker curve instead of on the expected, ...

research-article
Mimic defense: a designed‐in cybersecurity defense framework

In recent years, both academia and industry in cyber security have tried to develop innovative defense technologies, expecting that to change the rules of the game between attackers and defenders. The authors start by analysing the root causes of security ...

research-article
Information security collaboration formation in organisations

The protection of organisational information assets requires the collaboration of all employees; information security collaboration (ISC) aggregates the efforts of employees in order to mitigate the effect of information security breaches and incidents. ...

Comments