首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Publicly verifiable secret sharing: Generic constructions and lattice-based instantiations in the standard model 可公开验证的秘密共享:标准模型中的通用结构和基于格的实例化
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-31 DOI: 10.1016/j.csi.2025.104090
Nhat-Minh Pham , Khoa Nguyen , Willy Susilo , Khuong Nguyen-An
Publicly verifiable secret sharing (PVSS) allows a dealer to share a secret among a set of shareholders so that the secret can be reconstructed later from any set of qualified participants. In addition, any public verifier should be able to check the correctness of the sharing and reconstruction process. PVSS has been demonstrated to yield various applications, such as e-voting, decentralized random number generation protocols, and secure computation on distributed networks. Although many concrete PVSS protocols have been proposed, their security is either proven in the random oracle model or relies on quantum-vulnerable assumptions such as factoring or discrete logarithm. In this work, we propose a generic construction of a PVSS from any public key encryption scheme and non-interactive zero-knowledge arguments for suitable gap languages. We then provide lattice-based instantiations of the underlying components, which can be proven in the standard model. As a result, we construct the first post-quantum PVSS in the standard model, with a reasonable level of asymptotic efficiency.
公开可验证的秘密共享(PVSS)允许交易商在一组股东之间共享秘密,以便以后可以从任何一组合格的参与者中重建秘密。此外,任何公共验证者都应该能够检查共享和重建过程的正确性。PVSS已被证明可以产生各种应用,例如电子投票、分散随机数生成协议和分布式网络上的安全计算。尽管已经提出了许多具体的PVSS协议,但它们的安全性要么在随机oracle模型中得到证明,要么依赖于易受量子攻击的假设,如因式分解或离散对数。在这项工作中,我们提出了一种基于任何公钥加密方案和非交互式零知识参数的PVSS的通用构造,适用于合适的间隙语言。然后,我们提供了底层组件的基于网格的实例化,这可以在标准模型中得到证明。因此,我们在标准模型中构造了第一个后量子PVSS,并具有合理的渐近效率。
{"title":"Publicly verifiable secret sharing: Generic constructions and lattice-based instantiations in the standard model","authors":"Nhat-Minh Pham ,&nbsp;Khoa Nguyen ,&nbsp;Willy Susilo ,&nbsp;Khuong Nguyen-An","doi":"10.1016/j.csi.2025.104090","DOIUrl":"10.1016/j.csi.2025.104090","url":null,"abstract":"<div><div>Publicly verifiable secret sharing (PVSS) allows a dealer to share a secret among a set of shareholders so that the secret can be reconstructed later from any set of qualified participants. In addition, any public verifier should be able to check the correctness of the sharing and reconstruction process. PVSS has been demonstrated to yield various applications, such as e-voting, decentralized random number generation protocols, and secure computation on distributed networks. Although many concrete PVSS protocols have been proposed, their security is either proven in the random oracle model or relies on quantum-vulnerable assumptions such as factoring or discrete logarithm. In this work, we propose a generic construction of a PVSS from any public key encryption scheme and non-interactive zero-knowledge arguments for suitable gap languages. We then provide lattice-based instantiations of the underlying components, which can be proven in the standard model. As a result, we construct the first post-quantum PVSS in the standard model, with a reasonable level of asymptotic efficiency.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104090"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a multi-core certification Job-Aid for AMC 20-193 迈向多核心认证作业辅助amc20 -193
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-08-05 DOI: 10.1016/j.csi.2025.104049
James Sharp , Mike Standish , Jaspal Sagoo , Edwin van de Sluis
Multi-Core Processors (MCPs) are ubiquitous in modern electronic devices. However, their exploitation within the high criticality domains, specifically that of aerospace, introduces challenges. The European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) recently released harmonised guidance in the form of Acceptable Means of Compliance (AMC) 20-193, which details what is required, from a certification perspective, to enable the use of MCPs for satisfying airworthiness requirements. Although regulatory authorities have withdrawn Job Aids for standards such as DO-178 and DO-254, they are an effective method of showing compliance to standards and widely used by assessors. Understanding MCPs is, however, non-trivial and requires significant expertise not only of the device itself, but also how software will be architected and executed, along with how system level safety considerations are to be employed, all to ensure safe application of this technology. Thus, within this paper the authors, through the provision of an assessment of the what detailed in AMC 20-193, give an in-depth analysis into the intent behind the 10 objectives set out in this new AMC. The aim of the paper is to provide a foundation upon which Subject Matter Experts (SMEs) might construct their own Job Aid. Through its discussions, it is the authors intention that this paper enables a common understanding against which an applicant, assessor, and authority can interpret the how when looking to achieve the what set out in AMC 20-193.
多核处理器(mcp)在现代电子设备中无处不在。然而,它们在高临界领域的开发,特别是航空航天领域,带来了挑战。欧盟航空安全局(EASA)和美国联邦航空管理局(FAA)最近以可接受合规方式(AMC) 20-193的形式发布了统一指南,从认证的角度详细说明了使用mcp满足适航要求所需的条件。尽管监管机构已经撤销了DO-178和DO-254等标准的工作辅助,但它们是显示符合标准的有效方法,并被评估人员广泛使用。然而,了解mcp并非易事,不仅需要设备本身的大量专业知识,还需要了解软件的架构和执行方式,以及如何采用系统级安全考虑因素,所有这些都是为了确保该技术的安全应用。因此,在本文中,作者通过对AMC 20-193中详细内容的评估,对新AMC中设定的10个目标背后的意图进行了深入分析。本文的目的是为中小企业提供一个基础,在此基础上,中小企业可以构建自己的就业援助。通过其讨论,作者的意图是使申请人,评估者和权威机构能够在寻求实现AMC 20-193中规定的内容时解释如何达成共识。
{"title":"Towards a multi-core certification Job-Aid for AMC 20-193","authors":"James Sharp ,&nbsp;Mike Standish ,&nbsp;Jaspal Sagoo ,&nbsp;Edwin van de Sluis","doi":"10.1016/j.csi.2025.104049","DOIUrl":"10.1016/j.csi.2025.104049","url":null,"abstract":"<div><div>Multi-Core Processors (MCPs) are ubiquitous in modern electronic devices. However, their exploitation within the high criticality domains, specifically that of aerospace, introduces challenges. The European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) recently released harmonised guidance in the form of Acceptable Means of Compliance (AMC) 20-193, which details <em>what</em> is required, from a certification perspective, to enable the use of MCPs for satisfying airworthiness requirements. Although regulatory authorities have withdrawn Job Aids for standards such as DO-178 and DO-254, they are an effective method of showing compliance to standards and widely used by assessors. Understanding MCPs is, however, non-trivial and requires significant expertise not only of the device itself, but also how software will be architected and executed, along with how system level safety considerations are to be employed, all to ensure safe application of this technology. Thus, within this paper the authors, through the provision of an assessment of the <em>what</em> detailed in AMC 20-193, give an in-depth analysis into the intent behind the 10 objectives set out in this new AMC. The aim of the paper is to provide a foundation upon which Subject Matter Experts (SMEs) might construct their own Job Aid. Through its discussions, it is the authors intention that this paper enables a common understanding against which an applicant, assessor, and authority can interpret the <em>how</em> when looking to achieve the <em>what</em> set out in AMC 20-193.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104049"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Wireless Body Area Network with lightweight certificateless signcryption scheme using equality test 使用相等性测试的轻量级无证书签名加密方案保护无线体域网络
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-17 DOI: 10.1016/j.csi.2025.104070
Zohaib Ali , Junaid Hassan , Muhammad Umar Aftab , Negalign Wake Hundera , Huiying Xu , Xinzhong Zhu
The growth of Internet of Things (IoT) technologies, such as cloud computing, 5G communication, and wireless sensor networks, is driving a smarter and more connected future. Thousands of terabytes of data are uploaded to cloud servers each day for storage or computation. Due to data privacy, we cannot upload personal pictures, videos, locations, and medical records directly to the cloud because they will be at risk if compromised. Due to the untrusted nature of the cloud, data needs to be encrypted to ensure confidentiality before being outsourced to it. The data must first be decrypted before any operation can be performed, which can be resource-intensive and wasteful. Secure data transmission from sensors to an Internet host becomes a critical issue for the success of IoT. To address these issues, this paper introduces a lightweight certificateless signcryption scheme with an equality test (CLS-ET), which leverages the power of hyperelliptic curves. This scheme obtains the security goals of authentication, integrity, confidentiality, and non-repudiation in one logical step. Furthermore, this scheme enables us to verify whether two ciphertexts are encrypted with the same or different keys that contain the same information without decrypting them. Indistinguishability under adaptive chosen ciphertext attack (IND-CCA2), existential unforgeability under chosen message attack (EUF-CMA), and one-wayness under adaptive chosen ciphertext attack (OW-CCA2) level security have been achieved by the proposed scheme in the Random Oracle Model (ROM). Furthermore, we compared our proposed scheme with other existing state-of-the-art schemes. While maintaining security and functionality, our scheme reduces computation costs for encryption, decryption, and testing stages, thereby improving efficiency in resource-constrained IoT-enabled Wireless Body Area Networks.
物联网(IoT)技术的发展,如云计算、5G通信和无线传感器网络,正在推动一个更智能、更互联的未来。每天有数千兆字节的数据上传到云服务器进行存储或计算。由于数据隐私,我们不能将个人图片、视频、位置和医疗记录直接上传到云端,因为一旦泄露,这些信息将面临风险。由于云的不可信性质,在外包给云之前,需要对数据进行加密以确保机密性。在执行任何操作之前,必须首先对数据进行解密,这可能是资源密集型和浪费的。从传感器到互联网主机的安全数据传输成为物联网成功的关键问题。为了解决这些问题,本文引入了一种轻量级的带等式检验的无证书签名加密方案(CLS-ET),该方案利用了超椭圆曲线的力量。该方案在一个逻辑步骤中实现了认证、完整性、机密性和不可抵赖性的安全目标。此外,该方案使我们能够在不解密的情况下验证两个密文是否使用包含相同信息的相同或不同密钥进行加密。该方案在随机Oracle模型(ROM)中实现了自适应选择密文攻击(IND-CCA2)下的不可区分性、选择消息攻击(EUF-CMA)下的存在不可伪造性和自适应选择密文攻击(low - cca2)下的单向安全性。此外,我们将建议的方案与其他现有最先进的方案进行比较。在保持安全性和功能性的同时,我们的方案减少了加密、解密和测试阶段的计算成本,从而提高了资源受限的物联网无线体域网络的效率。
{"title":"Securing Wireless Body Area Network with lightweight certificateless signcryption scheme using equality test","authors":"Zohaib Ali ,&nbsp;Junaid Hassan ,&nbsp;Muhammad Umar Aftab ,&nbsp;Negalign Wake Hundera ,&nbsp;Huiying Xu ,&nbsp;Xinzhong Zhu","doi":"10.1016/j.csi.2025.104070","DOIUrl":"10.1016/j.csi.2025.104070","url":null,"abstract":"<div><div>The growth of Internet of Things (IoT) technologies, such as cloud computing, 5G communication, and wireless sensor networks, is driving a smarter and more connected future. Thousands of terabytes of data are uploaded to cloud servers each day for storage or computation. Due to data privacy, we cannot upload personal pictures, videos, locations, and medical records directly to the cloud because they will be at risk if compromised. Due to the untrusted nature of the cloud, data needs to be encrypted to ensure confidentiality before being outsourced to it. The data must first be decrypted before any operation can be performed, which can be resource-intensive and wasteful. Secure data transmission from sensors to an Internet host becomes a critical issue for the success of IoT. To address these issues, this paper introduces a lightweight certificateless signcryption scheme with an equality test (CLS-ET), which leverages the power of hyperelliptic curves. This scheme obtains the security goals of authentication, integrity, confidentiality, and non-repudiation in one logical step. Furthermore, this scheme enables us to verify whether two ciphertexts are encrypted with the same or different keys that contain the same information without decrypting them. Indistinguishability under adaptive chosen ciphertext attack (IND-CCA2), existential unforgeability under chosen message attack (EUF-CMA), and one-wayness under adaptive chosen ciphertext attack (OW-CCA2) level security have been achieved by the proposed scheme in the Random Oracle Model (ROM). Furthermore, we compared our proposed scheme with other existing state-of-the-art schemes. While maintaining security and functionality, our scheme reduces computation costs for encryption, decryption, and testing stages, thereby improving efficiency in resource-constrained IoT-enabled Wireless Body Area Networks.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104070"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating blockchain and deep learning: a novel ensemble model for secure IoMT-driven intelligent healthcare solutions using ISSCNetV2 approach 集成区块链和深度学习:使用ISSCNetV2方法的安全iot驱动的智能医疗保健解决方案的新型集成模型
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-15 DOI: 10.1016/j.csi.2025.104076
Mahaboob Basha Shaik, Narasimha Rao Yamarthi
The Internet of Medical Things (IoMT) comprises a network of interconnected medical devices such as wearables, diagnostic tools, and implants that facilitate real-time data acquisition and remote healthcare monitoring. To ensure secure and reliable data transmission and storage in such environments, this study proposes an Enhanced Blockchain-based Intelligent Healthcare System with Ensemble Deep Learning (EBIHS-EDL). The system incorporates blockchain (BC) technology to maintain decentralized, tamper-proof records and employs a Bit-Level Chaotic Image Encryption Algorithm (BCIEA) for secure image encryption. Key generation is achieved using the Grasshopper–Black Hole Optimization (G–BHO) algorithm. To address the challenge of class imbalance in medical datasets, an Improved Tabular Generative Adversarial Network (ITGAN) is employed to synthesize minority class samples. For feature extraction, a Cross Siamese Res2Net (CSRes2Net) architecture is utilized, followed by classification using an integrated model, Improved ShuffleNetV2 and Spatiotemporal Convolutional Network-enhanced Transformer (ISSCNetV2). Comprehensive evaluations on benchmark medical datasets demonstrate the effectiveness of the proposed system, achieving an accuracy of 99.20%, sensitivity of 99.03%, and specificity of 99.46%. These results surpass those of existing models including DBN (94.15%), YOLO-GC (94.24%), ResNet (96.19%), VGG-19 (91.19%), and CDNN (95.29%), highlighting the superior performance and robustness of EBIHS-EDL in intelligent healthcare applications.
医疗物联网(IoMT)由可穿戴设备、诊断工具和植入物等相互连接的医疗设备组成,可促进实时数据采集和远程医疗监控。为了确保在这种环境下安全可靠地传输和存储数据,本研究提出了一种基于集成深度学习的增强区块链智能医疗保健系统(EBIHS-EDL)。该系统采用区块链(BC)技术来维护分散、防篡改的记录,并采用比特级混沌图像加密算法(BCIEA)进行安全图像加密。密钥生成使用Grasshopper-Black Hole Optimization (G-BHO)算法实现。为了解决医疗数据集中类别不平衡的问题,采用改进的表生成对抗网络(ITGAN)来合成少数类别样本。对于特征提取,使用Cross Siamese Res2Net (CSRes2Net)架构,然后使用集成模型,改进的ShuffleNetV2和时空卷积网络增强的Transformer (ISSCNetV2)进行分类。对基准医疗数据集的综合评估表明了该系统的有效性,准确率为99.20%,灵敏度为99.03%,特异性为99.46%。这些结果超过了DBN(94.15%)、ylo - gc(94.24%)、ResNet(96.19%)、VGG-19(91.19%)和CDNN(95.29%)等现有模型,突出了EBIHS-EDL在智能医疗应用中的优越性能和鲁棒性。
{"title":"Integrating blockchain and deep learning: a novel ensemble model for secure IoMT-driven intelligent healthcare solutions using ISSCNetV2 approach","authors":"Mahaboob Basha Shaik,&nbsp;Narasimha Rao Yamarthi","doi":"10.1016/j.csi.2025.104076","DOIUrl":"10.1016/j.csi.2025.104076","url":null,"abstract":"<div><div>The Internet of Medical Things (IoMT) comprises a network of interconnected medical devices such as wearables, diagnostic tools, and implants that facilitate real-time data acquisition and remote healthcare monitoring. To ensure secure and reliable data transmission and storage in such environments, this study proposes an Enhanced Blockchain-based Intelligent Healthcare System with Ensemble Deep Learning (EBIHS-EDL). The system incorporates blockchain (BC) technology to maintain decentralized, tamper-proof records and employs a Bit-Level Chaotic Image Encryption Algorithm (BCIEA) for secure image encryption. Key generation is achieved using the Grasshopper–Black Hole Optimization (G–BHO) algorithm. To address the challenge of class imbalance in medical datasets, an Improved Tabular Generative Adversarial Network (ITGAN) is employed to synthesize minority class samples. For feature extraction, a Cross Siamese Res2Net (CSRes2Net) architecture is utilized, followed by classification using an integrated model, Improved ShuffleNetV2 and Spatiotemporal Convolutional Network-enhanced Transformer (ISSCNetV2). Comprehensive evaluations on benchmark medical datasets demonstrate the effectiveness of the proposed system, achieving an accuracy of 99.20%, sensitivity of 99.03%, and specificity of 99.46%. These results surpass those of existing models including DBN (94.15%), YOLO-GC (94.24%), ResNet (96.19%), VGG-19 (91.19%), and CDNN (95.29%), highlighting the superior performance and robustness of EBIHS-EDL in intelligent healthcare applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104076"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145109388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive Intelligence for supporting Vehicle-SOC analysts 用于支持车辆soc分析师的汽车智能
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-17 DOI: 10.1016/j.csi.2025.104088
Vita Santa Barletta, Danilo Caivano, Christian Catalano, Mirko De Vincentiis, Michele Scalera
The automotive industry is designing increasingly sophisticated electronic components in order to make modern vehicles safer and more connected. This means not only more functionality available but also an increased risk to vehicle security and driver safety. Over the years, academia and industry have identified security issues in Electronic Control Units (ECUs) software and the protocols they use to communicate. Many of the attacks proposed in the literature exploit weaknesses in the Controller Area Network (CAN), one of the most widely used protocols for internal network communication. Researchers have proposed techniques focused on using Machine Learning (ML) models to identify attacks that exploit vulnerabilities in the CAN protocol. However, these techniques are not enough, as it is necessary to introduce the knowledge of how these attacks occurred and propose remediations to counter them to design more secure components. So, it is necessary to use ML models that use a multi-class classification to obtain the attack typology to obtain information that aims to resolve or understand the threat. To this end, this paper proposes a Pachamama methodology that identifies CAN attacks by proposing a simulation environment in which an ML algorithm is deployed. Then, a Vehicle-Security Operation Center (Vehicle-SOC) allows the classification of the received message from the Intrusion Detection System (IDS) to propose remediations for security analysts or developers working in the automotive world.
汽车工业正在设计越来越复杂的电子元件,以使现代汽车更安全,更互联。这不仅意味着更多的功能可用,但也增加了车辆安全和驾驶员安全的风险。多年来,学术界和工业界已经发现了电子控制单元(ecu)软件及其用于通信的协议中的安全问题。文献中提出的许多攻击都利用了控制器局域网(CAN)的弱点,CAN是内部网络通信中使用最广泛的协议之一。研究人员提出了使用机器学习(ML)模型来识别利用CAN协议漏洞的攻击的技术。然而,这些技术是不够的,因为有必要介绍这些攻击如何发生的知识,并提出补救措施来对抗它们,以设计更安全的组件。因此,有必要使用使用多类分类来获取攻击类型的ML模型,以获取旨在解决或理解威胁的信息。为此,本文提出了一种Pachamama方法,通过提出一个部署ML算法的模拟环境来识别CAN攻击。然后,车辆安全操作中心(Vehicle-SOC)允许对从入侵检测系统(IDS)接收的消息进行分类,以便为在汽车领域工作的安全分析师或开发人员提出补救措施。
{"title":"Automotive Intelligence for supporting Vehicle-SOC analysts","authors":"Vita Santa Barletta,&nbsp;Danilo Caivano,&nbsp;Christian Catalano,&nbsp;Mirko De Vincentiis,&nbsp;Michele Scalera","doi":"10.1016/j.csi.2025.104088","DOIUrl":"10.1016/j.csi.2025.104088","url":null,"abstract":"<div><div>The automotive industry is designing increasingly sophisticated electronic components in order to make modern vehicles safer and more connected. This means not only more functionality available but also an increased risk to vehicle security and driver safety. Over the years, academia and industry have identified security issues in Electronic Control Units (ECUs) software and the protocols they use to communicate. Many of the attacks proposed in the literature exploit weaknesses in the Controller Area Network (CAN), one of the most widely used protocols for internal network communication. Researchers have proposed techniques focused on using Machine Learning (ML) models to identify attacks that exploit vulnerabilities in the CAN protocol. However, these techniques are not enough, as it is necessary to introduce the knowledge of how these attacks occurred and propose remediations to counter them to design more secure components. So, it is necessary to use ML models that use a multi-class classification to obtain the attack typology to obtain information that aims to resolve or understand the threat. To this end, this paper proposes a Pachamama methodology that identifies CAN attacks by proposing a simulation environment in which an ML algorithm is deployed. Then, a Vehicle-Security Operation Center (Vehicle-SOC) allows the classification of the received message from the Intrusion Detection System (IDS) to propose remediations for security analysts or developers working in the automotive world.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104088"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145361676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FGPB-EMR: Fine-grained privacy blockchain for electronic medical record sharing FGPB-EMR:用于电子医疗记录共享的细粒度隐私区块链
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-22 DOI: 10.1016/j.csi.2025.104089
Wei Liang , Yang Yang , Sisi Zhou , Zhishun Zhang , Yuxiang Chen , Kai Jin , Xiong Li , Kuanching Li , Jiannong Cao
Electronic Medical Records are instrumental in advancing smart healthcare within the landscape of the Internet of Things, delivering highly personalized and prompt medical services to patients. However, existing healthcare data management systems are commonly characterized by provider centralization and over-regulation, posing significant threats to data security and integrity. Blockchain-based EMR secure sharing provides an effective scheme but still suffers from challenges such as insufficiently fine-grained data access control, susceptibility to user privacy leakage, high storage costs, and key management risks. Therefore, we propose FGPB-EMR, a user-centric blockchain for EMR sharing scheme with fine-grained access and privacy. We introduce the ciphertext policy of entirely hidden and updated attribute encryption, design an EMR sharing method with fine-grained access control, and guarantee its execution through a secure key distribution mechanism. In addition, based on the Paillier algorithm, we construct a co-sharing mechanism that supports privacy computation to achieve neutrality and interoperability of health insurance claims. To enhance the storage efficiency of blockchain data, we also design an on-chain and off-chain co-sharing protocol. Through comparative analysis and test validation, the FGPB-EMR scheme reduces the processing time by about half compared to other methods when sharing EMR; the interaction time is also reduced by about 20% when processing medical claims. In addition, the test results demonstrate the scheme’s scalability.
电子病历有助于在物联网环境下推进智能医疗,为患者提供高度个性化和及时的医疗服务。然而,现有的医疗保健数据管理系统通常具有提供商集中化和过度监管的特点,对数据安全性和完整性构成了重大威胁。基于区块链的EMR安全共享提供了一种有效的方案,但仍然面临着诸如细粒度数据访问控制不足、易受用户隐私泄露、存储成本高、密钥管理风险等挑战。因此,我们提出了FGPB-EMR,这是一种以用户为中心的EMR共享方案,具有细粒度访问和隐私。我们引入了完全隐藏和更新属性加密的密文策略,设计了一种具有细粒度访问控制的EMR共享方法,并通过安全密钥分发机制保证其执行。此外,基于Paillier算法,构建支持隐私计算的共同共享机制,实现医保理赔的中立性和互操作性。为了提高区块链数据的存储效率,我们还设计了链上和链下的共共享协议。通过对比分析和测试验证,在共享EMR时,FGPB-EMR方案的处理时间比其他方法缩短了一半左右;在处理医疗索赔时,交互时间也减少了约20%。此外,测试结果表明了该方案的可扩展性。
{"title":"FGPB-EMR: Fine-grained privacy blockchain for electronic medical record sharing","authors":"Wei Liang ,&nbsp;Yang Yang ,&nbsp;Sisi Zhou ,&nbsp;Zhishun Zhang ,&nbsp;Yuxiang Chen ,&nbsp;Kai Jin ,&nbsp;Xiong Li ,&nbsp;Kuanching Li ,&nbsp;Jiannong Cao","doi":"10.1016/j.csi.2025.104089","DOIUrl":"10.1016/j.csi.2025.104089","url":null,"abstract":"<div><div>Electronic Medical Records are instrumental in advancing smart healthcare within the landscape of the Internet of Things, delivering highly personalized and prompt medical services to patients. However, existing healthcare data management systems are commonly characterized by provider centralization and over-regulation, posing significant threats to data security and integrity. Blockchain-based EMR secure sharing provides an effective scheme but still suffers from challenges such as insufficiently fine-grained data access control, susceptibility to user privacy leakage, high storage costs, and key management risks. Therefore, we propose FGPB-EMR, a user-centric blockchain for EMR sharing scheme with fine-grained access and privacy. We introduce the ciphertext policy of entirely hidden and updated attribute encryption, design an EMR sharing method with fine-grained access control, and guarantee its execution through a secure key distribution mechanism. In addition, based on the Paillier algorithm, we construct a co-sharing mechanism that supports privacy computation to achieve neutrality and interoperability of health insurance claims. To enhance the storage efficiency of blockchain data, we also design an on-chain and off-chain co-sharing protocol. Through comparative analysis and test validation, the FGPB-EMR scheme reduces the processing time by about half compared to other methods when sharing EMR; the interaction time is also reduced by about 20% when processing medical claims. In addition, the test results demonstrate the scheme’s scalability.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104089"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145361677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEArgmax: Secure homomorphic encryption-based protocols for Argmax function HEArgmax:基于安全同态加密的Argmax函数协议
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-12 DOI: 10.1016/j.csi.2025.104071
Duy Tung Khanh Nguyen , Dung Hoang Duong , Willy Susilo , Yang-Wai Chow , The Anh Ta
In the current era of big data, cloud-based Machine Learning as a Service (MLaaS) – where clients send encrypted queries to the cloud and receive prediction results – has gained significant attention. However, privacy concerns arise as cloud servers typically require access to clients’ raw data, potentially exposing sensitive information. Homomorphic encryption (HE), an advanced cryptographic technique that allows computation on encrypted data without decryption, offers a promising foundation for privacy-preserving MLaaS. A critical challenge in this context is the efficient and secure evaluation of the argmax function—a key operation in classification tasks used to select the class with the highest predicted probability. Existing HE-based methods, such as Phoenix (Jovanovic et al., 2022), rely on non-interactive protocols using high-degree polynomial approximations of the sign function, which lead to significant computational overhead. This paper introduces HEArgmax, an interactive protocol designed for efficient and secure argmax evaluation under encryption. Unlike prior approaches, HEArgmax leverages the algebraic properties of the sign function in combination with a lightweight interactive mechanism under the standard semi-honest model, without requiring trusted setup or multi-party computation. We present two protocol variants: HEArgmax-HT, optimized for high-throughput scenarios using batch processing, and HEArgmax-LC, which minimizes communication by processing a single encrypted vector. Experiments show that HEArgmax reduces inference latency from 157 s to 8 s on the MNIST dataset, and performs well even on CIFAR-100 with 100 output classes, completing in under 4 min using 128-bit HE security parameters. Despite being interactive, our protocol achieves comparable communication costs to Phoenix. These results demonstrate that HEArgmax is both practical and scalable for real-world privacy-preserving MLaaS deployments.
在当前的大数据时代,基于云的机器学习即服务(MLaaS)——客户端向云发送加密查询并接收预测结果——已经获得了极大的关注。然而,由于云服务器通常需要访问客户的原始数据,因此可能会暴露敏感信息,因此会出现隐私问题。同态加密(HE)是一种先进的加密技术,允许在不解密的情况下对加密数据进行计算,为保护隐私的MLaaS提供了良好的基础。在这种情况下,一个关键的挑战是对argmax函数的高效和安全的求值,这是分类任务中的一个关键操作,用于选择具有最高预测概率的类。现有的基于he的方法,如Phoenix (Jovanovic et al., 2022),依赖于使用符号函数的高次多项式近似的非交互式协议,这导致了显著的计算开销。本文介绍了一种用于加密下高效、安全的argmax求值的交互协议——HEArgmax。与之前的方法不同,HEArgmax利用符号函数的代数特性,结合标准半诚实模型下的轻量级交互机制,不需要可信设置或多方计算。我们提出了两种协议变体:针对使用批处理的高吞吐量场景进行优化的HEArgmax-HT和通过处理单个加密向量来最大限度地减少通信的HEArgmax-LC。实验表明,在MNIST数据集上,HEArgmax将推理延迟从157秒减少到8秒,并且即使在具有100个输出类的CIFAR-100上也表现良好,使用128位HE安全参数在4分钟内完成。尽管是交互式的,但我们的协议实现了与Phoenix相当的通信成本。这些结果表明,对于现实世界中保护隐私的MLaaS部署,HEArgmax既实用又可扩展。
{"title":"HEArgmax: Secure homomorphic encryption-based protocols for Argmax function","authors":"Duy Tung Khanh Nguyen ,&nbsp;Dung Hoang Duong ,&nbsp;Willy Susilo ,&nbsp;Yang-Wai Chow ,&nbsp;The Anh Ta","doi":"10.1016/j.csi.2025.104071","DOIUrl":"10.1016/j.csi.2025.104071","url":null,"abstract":"<div><div>In the current era of big data, cloud-based Machine Learning as a Service (MLaaS) – where clients send encrypted queries to the cloud and receive prediction results – has gained significant attention. However, privacy concerns arise as cloud servers typically require access to clients’ raw data, potentially exposing sensitive information. Homomorphic encryption (HE), an advanced cryptographic technique that allows computation on encrypted data without decryption, offers a promising foundation for privacy-preserving MLaaS. A critical challenge in this context is the efficient and secure evaluation of the <em>argmax</em> function—a key operation in classification tasks used to select the class with the highest predicted probability. Existing HE-based methods, such as Phoenix (Jovanovic et al., 2022), rely on non-interactive protocols using high-degree polynomial approximations of the sign function, which lead to significant computational overhead. This paper introduces <span><math><mi>HEArgmax</mi></math></span>, an interactive protocol designed for efficient and secure <span><math><mrow><mi>a</mi><mi>r</mi><mi>g</mi><mi>m</mi><mi>a</mi><mi>x</mi></mrow></math></span> evaluation under encryption. Unlike prior approaches, <span><math><mi>HEArgmax</mi></math></span> leverages the algebraic properties of the sign function in combination with a lightweight interactive mechanism under the standard semi-honest model, without requiring trusted setup or multi-party computation. We present two protocol variants: <span><math><mi>HEArgmax</mi></math></span>-HT, optimized for high-throughput scenarios using batch processing, and <span><math><mi>HEArgmax</mi></math></span>-LC, which minimizes communication by processing a single encrypted vector. Experiments show that <span><math><mi>HEArgmax</mi></math></span> reduces inference latency from 157 s to 8 s on the MNIST dataset, and performs well even on CIFAR-100 with 100 output classes, completing in under 4 min using 128-bit HE security parameters. Despite being interactive, our protocol achieves comparable communication costs to Phoenix. These results demonstrate that <span><math><mi>HEArgmax</mi></math></span> is both practical and scalable for real-world privacy-preserving MLaaS deployments.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104071"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud data sharing scheme by using SM2 ring signature-based broadcast encryption 一个基于SM2环签名的广播加密的云数据共享方案
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-19 DOI: 10.1016/j.csi.2025.104072
Changsong Yang , Ping Li , Yong Ding , Hai Liang , Shuo Wang
Amidst the surge of cloud computing, cloud-based data sharing has been broadly used. However, in cloud-based sharing, it is necessary to ensure data reliability, guarantee data integrity and protect user’s identity. Although traditional ring signature algorithms can provide strong data reliability and privacy protection, it is difficult to arbitrate the true identity of the signer. In this paper, we propose a SM2 ring signature broadcasting encryption scheme which is suitable for secure cloud data sharing. By introducing a third party, we generate a signer’s identity label that serves as an important parameter for the SM2 ring signature when we generate the signature value and revocation label. Meanwhile, we design a revocation mechanism that allows the third party to execute a revocation anonymity algorithm by using the revocation label to expose the signer’s identity. Moreover, any member can also check whether the third party has acted maliciously through the revocable anonymity label. Furthermore, we use the proposed signature broadcasting encryption scheme to achieve data sharing with data integrity, unforgeability, anonymity, revocable anonymity and ciphertext indistinguishability. Finally, we provide the experimental results to show the efficiency and practicability of our proposed scheme.
随着云计算的兴起,基于云的数据共享得到了广泛的应用。然而,在基于云的共享中,需要保证数据的可靠性,保证数据的完整性,保护用户的身份。传统的环签名算法虽然能够提供较强的数据可靠性和隐私保护,但难以对签名者的真实身份进行仲裁。本文提出了一种适用于安全云数据共享的SM2环签名广播加密方案。通过引入第三方,我们生成签名者的身份标签,当我们生成签名值和撤销标签时,该身份标签将作为SM2环签名的重要参数。同时,我们设计了一种允许第三方通过使用撤销标签公开签名者身份来执行撤销匿名算法的撤销机制。此外,任何成员还可以通过可撤销的匿名标签检查第三方是否有恶意行为。此外,我们使用所提出的签名广播加密方案来实现具有数据完整性、不可伪造性、匿名性、可撤销匿名性和密文不可分辨性的数据共享。最后给出了实验结果,验证了所提方案的有效性和实用性。
{"title":"A cloud data sharing scheme by using SM2 ring signature-based broadcast encryption","authors":"Changsong Yang ,&nbsp;Ping Li ,&nbsp;Yong Ding ,&nbsp;Hai Liang ,&nbsp;Shuo Wang","doi":"10.1016/j.csi.2025.104072","DOIUrl":"10.1016/j.csi.2025.104072","url":null,"abstract":"<div><div>Amidst the surge of cloud computing, cloud-based data sharing has been broadly used. However, in cloud-based sharing, it is necessary to ensure data reliability, guarantee data integrity and protect user’s identity. Although traditional ring signature algorithms can provide strong data reliability and privacy protection, it is difficult to arbitrate the true identity of the signer. In this paper, we propose a SM2 ring signature broadcasting encryption scheme which is suitable for secure cloud data sharing. By introducing a third party, we generate a signer’s identity label that serves as an important parameter for the SM2 ring signature when we generate the signature value and revocation label. Meanwhile, we design a revocation mechanism that allows the third party to execute a revocation anonymity algorithm by using the revocation label to expose the signer’s identity. Moreover, any member can also check whether the third party has acted maliciously through the revocable anonymity label. Furthermore, we use the proposed signature broadcasting encryption scheme to achieve data sharing with data integrity, unforgeability, anonymity, revocable anonymity and ciphertext indistinguishability. Finally, we provide the experimental results to show the efficiency and practicability of our proposed scheme.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104072"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145118621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SM9-based device-friendly distributed decryption scheme for IoHT 基于sm9的设备友好的IoHT分布式解密方案
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-09-03 DOI: 10.1016/j.csi.2025.104069
Longjiao Li , Jianchang Lai , Liquan Chen , Zhen Zhao , Ge Wu , Xinyan Yang
IoHT is a specific application of IoT technology in the healthcare field, which enhances medical efficiency and quality. Ensuring secure data sharing among multiple parties is crucial in the IoHT, particularly for resource-constrained devices. As a Chinese national standard and an ISO/IEC standard, SM9 algorithm has been widely applied in IoT, finance, e-government and so on. Although existing SM9-based schemes can ensure data security during multi-party sharing, their high computational overhead makes them unsuitable for lightweight devices. To address this issue, this paper proposes an efficient distributed decryption scheme based on SM9. The proposed scheme achieves secure and efficient multi-party data sharing. And the proposed scheme is very friendly to lightweight devices, as it avoids computationally expensive operations such as bilinear pairing. Based on the q-BDHI assumption, the proposed scheme is proven to be CCA-secure. Finally, we implement our scheme through experiments and the results show that when the number of users reaches 100, the decryption time on resource-constrained devices is about 6 ms, demonstrating that the proposed scheme is suitable for deployment in IoHT.
物联网是物联网技术在医疗保健领域的具体应用,可以提高医疗效率和医疗质量。确保多方之间的安全数据共享在IoHT中至关重要,特别是对于资源受限的设备。SM9算法作为中国国家标准和ISO/IEC标准,已广泛应用于物联网、金融、电子政务等领域。尽管现有的基于sm9的方案可以确保多方共享期间的数据安全,但它们的高计算开销使它们不适合轻量级设备。为了解决这一问题,本文提出了一种基于SM9的高效分布式解密方案。该方案实现了安全高效的多方数据共享。该方案避免了双线性配对等计算成本高的操作,对轻量级设备非常友好。基于q-BDHI假设,证明了该方案是cca安全的。最后,我们通过实验实现了我们的方案,结果表明,当用户数量达到100时,在资源受限的设备上的解密时间约为6 ms,表明所提出的方案适合部署在IoHT中。
{"title":"SM9-based device-friendly distributed decryption scheme for IoHT","authors":"Longjiao Li ,&nbsp;Jianchang Lai ,&nbsp;Liquan Chen ,&nbsp;Zhen Zhao ,&nbsp;Ge Wu ,&nbsp;Xinyan Yang","doi":"10.1016/j.csi.2025.104069","DOIUrl":"10.1016/j.csi.2025.104069","url":null,"abstract":"<div><div>IoHT is a specific application of IoT technology in the healthcare field, which enhances medical efficiency and quality. Ensuring secure data sharing among multiple parties is crucial in the IoHT, particularly for resource-constrained devices. As a Chinese national standard and an ISO/IEC standard, SM9 algorithm has been widely applied in IoT, finance, e-government and so on. Although existing SM9-based schemes can ensure data security during multi-party sharing, their high computational overhead makes them unsuitable for lightweight devices. To address this issue, this paper proposes an efficient distributed decryption scheme based on SM9. The proposed scheme achieves secure and efficient multi-party data sharing. And the proposed scheme is very friendly to lightweight devices, as it avoids computationally expensive operations such as bilinear pairing. Based on the <span><math><mi>q</mi></math></span>-BDHI assumption, the proposed scheme is proven to be CCA-secure. Finally, we implement our scheme through experiments and the results show that when the number of users reaches 100, the decryption time on resource-constrained devices is about 6 ms, demonstrating that the proposed scheme is suitable for deployment in IoHT.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104069"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logarithmic certificate-less linkable ring signature over lattices and application in electronic voting systems 格上对数无证书可链接环签名及其在电子投票系统中的应用
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-03-01 Epub Date: 2025-10-14 DOI: 10.1016/j.csi.2025.104081
Wen Gao , Shixuan Jin , Tianyou Fu , Simeng Ren , Xiaoli Dong , Baodong Qin , Baocang Wang
Ring signature is widely used to protect users’ privacy in electronic voting (e-voting) and cryptocurrencies due to its untraceable characteristic. Since the ring signature cannot be traced, there is no way to prevent signature misuse, which may lead to repeated voting in e-voting systems. As a variant of ring signature, the linkable ring signature maintains anonymity while allowing one to check whether two signatures are generated by the same signer. However, most existing lattice-based linkable ring signature schemes rely on traditional public key infrastructure (PKI), which suffers from complex certificate management and low efficiency. To address these limitations, this paper proposes an efficient certificate-less linkable ring signature (CL-LRS) scheme over lattices based on the module short integer solution (M-SIS) problem. This scheme eliminates certificate management and key escrow issues, and effectively prevents repeated voting in anonymous e-voting systems. Through security analysis, our scheme is proven to be anonymous, unforgeable and linkable in random oracle model (ROM). Compared to existing similar schemes, whose signature sizes grow linearly with ring size, our scheme reduces the signature size to a logarithmic level. For a ring with 256 members, the optimal signature size among comparable schemes is 513.03 KiB, whereas ours achieves 179.12 KiB. Specifically, with each doubling of the ring size, the signature size increases by only 0.29%, significantly outperforming existing schemes. Finally, we apply our scheme to the e-voting scenario by providing the e-voting system model and the application process.
环签名由于其不可追溯的特性,在电子投票(e-voting)和加密货币中广泛应用于保护用户隐私。由于环形签名无法追踪,因此无法防止签名滥用,从而可能导致电子投票系统中的重复投票。可链接环签名是环签名的一种变体,它在保持匿名性的同时,允许人们检查两个签名是否由同一签名者生成。然而,现有的基于格子的可链接环签名方案大多依赖于传统的公钥基础设施(PKI),证书管理复杂且效率低。为了解决这些限制,本文提出了一种基于模块短整数解(M-SIS)问题的高效的格上无证书可链接环签名(CL-LRS)方案。该方案消除了证书管理和密钥托管问题,有效地防止了匿名电子投票系统中的重复投票。通过安全性分析,证明了该方案在随机oracle模型(ROM)中具有匿名性、不可伪造性和可链接性。与现有的签名大小随环大小线性增长的方案相比,我们的方案将签名大小减小到对数级。对于有256个成员的环,在可比较方案中最优签名大小为513.03 KiB,而我们的方案达到179.12 KiB。具体而言,环大小每增加一倍,签名大小仅增加0.29%,明显优于现有方案。最后,通过提供电子投票系统模型和应用流程,将该方案应用于电子投票场景。
{"title":"Logarithmic certificate-less linkable ring signature over lattices and application in electronic voting systems","authors":"Wen Gao ,&nbsp;Shixuan Jin ,&nbsp;Tianyou Fu ,&nbsp;Simeng Ren ,&nbsp;Xiaoli Dong ,&nbsp;Baodong Qin ,&nbsp;Baocang Wang","doi":"10.1016/j.csi.2025.104081","DOIUrl":"10.1016/j.csi.2025.104081","url":null,"abstract":"<div><div>Ring signature is widely used to protect users’ privacy in electronic voting (e-voting) and cryptocurrencies due to its untraceable characteristic. Since the ring signature cannot be traced, there is no way to prevent signature misuse, which may lead to repeated voting in e-voting systems. As a variant of ring signature, the linkable ring signature maintains anonymity while allowing one to check whether two signatures are generated by the same signer. However, most existing lattice-based linkable ring signature schemes rely on traditional public key infrastructure (PKI), which suffers from complex certificate management and low efficiency. To address these limitations, this paper proposes an efficient certificate-less linkable ring signature (CL-LRS) scheme over lattices based on the module short integer solution (M-SIS) problem. This scheme eliminates certificate management and key escrow issues, and effectively prevents repeated voting in anonymous e-voting systems. Through security analysis, our scheme is proven to be anonymous, unforgeable and linkable in random oracle model (ROM). Compared to existing similar schemes, whose signature sizes grow linearly with ring size, our scheme reduces the signature size to a logarithmic level. For a ring with 256 members, the optimal signature size among comparable schemes is 513.03 KiB, whereas ours achieves 179.12 KiB. Specifically, with each doubling of the ring size, the signature size increases by only 0.29%, significantly outperforming existing schemes. Finally, we apply our scheme to the e-voting scenario by providing the e-voting system model and the application process.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104081"},"PeriodicalIF":3.1,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145361674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1