scholarly journals A new universal designated verifier transitive signature scheme for big graph data

2017 ◽  
Vol 83 (1) ◽  
pp. 73-83 ◽  
Author(s):  
Chao Lin ◽  
Wei Wu ◽  
Xinyi Huang ◽  
Li Xu
2019 ◽  
Vol 30 (4) ◽  
pp. 24-40
Author(s):  
Lei Li ◽  
Fang Zhang ◽  
Guanfeng Liu

Big graph data is different from traditional data and they usually contain complex relationships and multiple attributes. With the help of graph pattern matching, a pattern graph can be designed, satisfying special personal requirements and locate the subgraphs which match the required pattern. Then, how to locate a graph pattern with better attribute values in the big graph effectively and efficiently becomes a key problem to analyze and deal with big graph data, especially for a specific domain. This article introduces fuzziness into graph pattern matching. Then, a genetic algorithm, specifically an NSGA-II algorithm, and a particle swarm optimization algorithm are adopted for multi-fuzzy-objective optimization. Experimental results show that the proposed approaches outperform the existing approaches effectively.


2021 ◽  
Vol 17 (3) ◽  
pp. 155014772110017
Author(s):  
Han-Yu Lin

Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. However, compromised fog nodes controlled by an adversary might inject bogus data to cheat or confuse remote servers. It also causes the waste of communication and computation resources. To further control the lifetime of signing capability for fog nodes, an appropriate mechanism is crucial. In this article, the author proposes a time-constrained strong multi-designated verifier signature scheme to meet the above requirement. In particular, a conventional non-delegatable strong multi-designated verifier signature scheme with low computation is first given. Based on its constructions, we show how to transform it into a time-constrained variant. The unforgeability of the proposed schemes is formally proved based on the famous elliptic curve discrete logarithm assumption. The security requirement of strong signer ambiguity for our substantial constructions is also analyzed by utilizing the intractable assumption of decisional Diffie–Hellman. Moreover, some comparisons in terms of the signature size and computational costs for involved entities among related mechanisms are made.


2018 ◽  
Vol 31 (17) ◽  
pp. e3803 ◽  
Author(s):  
Perumal Thanalakshmi ◽  
Ramalingam Anitha

2020 ◽  
Vol 24 (4) ◽  
pp. 941-958
Author(s):  
Guliu Liu ◽  
Lei Li ◽  
Xindong Wu

Sign in / Sign up

Export Citation Format

Share Document