Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 6, Issue 1

2022 March - 13 articles

Cover Story: Anonymous authentication systems have received the attention of many fields, as they secure user privacy. Both group signatures and ring signatures preserve user anonymity, allowing users to hide their identity within a group. However, in group signatures, an authority (a manager) can trace a user by canceling the user's anonymity. The corrupted authority puts user privacy in danger. In ring signatures, users cannot be traced. Thus, both group signatures and ring signatures have questionable user traceability and anonymity. Many research studies are trying to balance user traceability and anonymity in group signatures and ring signatures. This paper surveys the current trends in balancing user traceability and anonymity in group signatures and ring signatures. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
13 Citations
5,389 Views
26 Pages

On the IND-CCA1 Security of FHE Schemes

  • Prastudy Fauzi,
  • Martha Norberg Hovd and
  • Håvard Raddum

Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. There are numerous FHE schemes, all of which are expanded from somewhat...

  • Review
  • Open Access
46 Citations
5,837 Views
25 Pages

Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly sinc...

  • Article
  • Open Access
2 Citations
5,149 Views
33 Pages

Many Internet of Things (IoT) devices use an Advanced Encryption Standard (AES) algorithm to secure data stored and transmitted during the communication process. The AES algorithm often suffers DC (DC) attacks. Little has been done to prevent DC atta...

  • Article
  • Open Access
6 Citations
3,925 Views
12 Pages

Trusted and Secure Blockchain-Based Durable Medium Electronic Service

  • Grzegorz Bazydło,
  • Remigiusz Wiśniewski and
  • Kamil Kozdrój

A novel, trusted, and secure durable medium electronic service is proposed in the paper. The proposed idea joins cryptographic methods (such as signing with an electronic seal and data encryption) with blockchain techniques. The e-service and blockch...

  • Article
  • Open Access
7 Citations
3,914 Views
20 Pages

To prevent eavesdropping and tampering, network security protocols take advantage of asymmetric ciphers to establish session-specific shared keys with which further communication is encrypted using symmetric ciphers. Commonly used asymmetric algorith...

  • Article
  • Open Access
27 Citations
7,047 Views
22 Pages

Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources in...

  • Article
  • Open Access
6 Citations
4,501 Views
14 Pages

An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures witho...

  • Article
  • Open Access
33 Citations
5,528 Views
17 Pages

This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm known as “Sigma protocol with helper”, and prove that the protocol’s secur...

  • Article
  • Open Access
2 Citations
3,225 Views
13 Pages

Based on the addressability of quantum superposition and its unitary transformation, a network-compatible, unconditionally secured key distribution protocol is presented for arbitrary networking in a classical regime with potential applications of on...

  • Article
  • Open Access
40 Citations
10,138 Views
22 Pages

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

  • Maharage Nisansala Sevwandi Perera,
  • Toru Nakamura,
  • Masayuki Hashimoto,
  • Hiroyuki Yokoyama,
  • Chen-Mou Cheng and
  • Kouichi Sakurai

This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability. Group signatures and ring signatures are the two leading competiti...

  • Article
  • Open Access
3 Citations
3,842 Views
29 Pages

In recent years, several new notions of security have begun receiving consideration for public-key cryptosystems, beyond the standard of security against adaptive chosen ciphertext attack (CCA2). Among these are security against randomness reset atta...

  • Article
  • Open Access
1 Citations
3,649 Views
13 Pages

Functional Encryption for Pattern Matching with a Hidden String

  • Jongkil Kim,
  • Yang-Wai Chow,
  • Willy Susilo,
  • Joonsang Baek and
  • Intae Kim

We propose a new functional encryption for pattern matching scheme with a hidden string. In functional encryption for pattern matching (FEPM), access to a message is controlled by its description and a private key that is used to evaluate the descrip...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X