Skip to main content

Showing 1–4 of 4 results for author: Idalino, T B

  1. Locating modifications in signed data for partial data integrity

    Authors: Thaís Bardini Idalino, Lucia Moura, Ricardo Felipe Custódio, Daniel Panario

    Abstract: We consider the problem of detecting and locating modifications in signed data to ensure partial data integrity. We assume that the data is divided into $n$ blocks (not necessarily of the same size) and that a threshold $d$ is given for the maximum amount of modified blocks that the scheme can support. We propose efficient algorithms for signature and verification steps which provide a reasonably… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: 14 pages

    Journal ref: Information Processing Letters 115 (2015) 731-737

  2. Modification tolerant signature schemes: location and correction

    Authors: Thais Bardini Idalino, Lucia Moura, Carlisle Adams

    Abstract: This paper considers malleable digital signatures, for situations where data is modified after it is signed. They can be used in applications where either the data can be modified (collaborative work), or the data must be modified (redactable and content extraction signatures) or we need to know which parts of the data have been modified (data forensics). A \new{classical} digital signature is val… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: 22 pages

    Journal ref: In: Progress in Cryptology - INDOCRYPT 2019. Lecture Notes in Computer Science, vol 11898. Springer, Cham (2019)

  3. Nested Cover-Free Families for Unbounded Fault-Tolerant Aggregate Signatures

    Authors: Thais Bardini Idalino, Lucia Moura

    Abstract: Aggregate signatures are used to create one short proof of authenticity and integrity from a set of digital signatures. However, one invalid signature in the set invalidates the entire aggregate, giving no information on which signatures are valid. Hartung et al. (2016) propose a fault-tolerant aggregate signature scheme based on combinatorial group testing. Given a bound $d$ on the number of inva… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: 30 pages

    Journal ref: Theoretical Computer Science 854 (2021) 116-130

  4. arXiv:2202.09264  [pdf, other

    cs.DM math.CO stat.ME

    Structure-aware combinatorial group testing: a new method for pandemic screening

    Authors: Thais Bardini Idalino, Lucia Moura

    Abstract: Combinatorial group testing (CGT) is used to identify defective items from a set of items by grouping them together and performing a small number of tests on the groups. Recently, group testing has been used to design efficient COVID-19 testing, so that resources are saved while still identifying all infected individuals. Due to test waiting times, a focus is given to non-adaptive CGT, where group… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.