Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Science and Technology Studies

Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway Jun 2015

Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway

Alexander Hayes Mr.

Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …


Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo Jan 2015

Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily …


An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo Jan 2015

An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Jan 2015

An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed byTiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they …