One-time proxy signatures revisited

2007-05-01
Bicakci, Kemal
Proxy signatures are useful constructions in grid computing, mobile agents and many other emerging applications. In a recent work [Huaxiong Wang and Josef Pieprzyk: Efficient One-Time Proxy Signatures. Proc. ASIACRYPT'03, LNCS 2894, Springer 2003.], Wang and Pieprzyk proposed a one-time signature scheme which allows full delegation to a proxy with an added feature that allows tracing the authorship of the signature in case of a dispute. In this paper we present a simple alternative approach that eliminates public-key cryptography in key generation, offers certainty and simplicity in the dispute resolution and avoids swallow attacks. We also introduce the concept of 1-out-of-n threshold traceable one-time signatures as an efficiency improvement.
COMPUTER STANDARDS & INTERFACES

Suggestions

A process capability based assessment model for software workforce in emergent software organizations
TANRIÖVER, ÖMER ÖZGÜR; Demirörs, Onur (Elsevier BV, 2015-01-01)
Software process improvement frameworks for software organizations enable to identify opportunities for improving the processes as well as establishing road maps for improvement. However, software process improvement practice showed that to achieve a sustained, leveraged state, software organizations need to focus on the workforce as much as the process. Software process improvement frameworks address the people dimension indirectly through processes. To complement process assessment models/methods, there i...
Cognitive routing protocol for disaster-inspired Internet of Things
Ai-Turjman, Fadi (Elsevier BV, 2019-03-01)
In this paper, we propose a framework for data delivery in large-scale networks for disaster management, where numerous wireless sensors are distributed over city traffic-infrastructures, shopping-malls' parking areas, airports' facilities, etc. In general, our framework caters for energy-efficient applications in the Internet of Things (IoT) where data is propagated via relays from diverse sensor-nodes towards a gateway connected to a large-scale network such as the Internet. We consider the entire network...
Energy and buffer aware application mapping for networks-on-chip with self similar traffic
Celik, Coskun; Bazlamaçcı, Cüneyt Fehmi (Elsevier BV, 2013-11-01)
Networks-on-chip (NoC) is a promising on-chip communication paradigm that improves scalability and performance of System-on-Chips. NoC design flow contains many problems from different areas, such as networking, embedded design and computer architecture. Application mapping is one of these problems, which is generally considered in the form of a communication energy minimization problem. Self similarity is a traffic model that is used to characterize Ethernet and/or wide area network traffic, as well as on-...
A systematic approach to the integration of overlapping partitions in service-oriented data grids
Sunercan, H. Kevser; Alpdemir, M. Nedim; Çiçekli, Fehime Nihan (Elsevier BV, 2011-06-01)
This paper aims to provide a service-oriented data integration solution over data Grids for cases where distributed data sources are partitioned with overlapping sections of various proportions. This is an interesting variation which combines both replicated and partitioned data within the same data management framework. Thus, the data management infrastructure has to deal with specific challenges regarding the identification, access and aggregation of partitioned data with varying proportions of overlappin...
Improving pattern quality in web usage mining by using semantic information
Karagöz, Pınar (Springer Science and Business Media LLC, 2012-03-01)
Frequent Web navigation patterns generated by using Web usage mining techniques provide valuable information for several applications such as Web site restructuring and recommendation. In conventional Web usage mining, semantic information of the Web page content does not take part in the pattern generation process. In this work, we investigate the effect of semantic information on the patterns generated for Web usage mining in the form of frequent sequences. To this aim, we developed a technique and a fram...
Citation Formats
K. Bicakci, “One-time proxy signatures revisited,” COMPUTER STANDARDS & INTERFACES, pp. 499–505, 2007, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/63733.