Figure 2 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Source publication
Similarity between two fuzzy values, sets, etc., may be defined in various ways. The authors here attempt introducing a general similarity measure based on the direct extension of the Boolean minimal form of equivalence operation. It is further extended to hierarchically structured multicomponent fuzzy signatures. Two versions of this measure, one...
Context in source publication
Context 1
... following statements refer to the activities in which individuals may choose to engage at work. For the bars to the right of each statement, the average score of responses is given to indicate the degree to which each of the following statements is true about the respondents (see Figure 2). It can be seen that in Hungary, all average scores of CWB (Q6-11 through Q6-14) are higher than in Lithuania. ...
Citations
... Furthermore, Shuichi Shuichi et al. (2021) formed an approach to cryptographic authentication systems that rely on biometrics, combining fuzzy signature and biometric authentication methods. In recent decades, Koczy et al. (2022) offered a novel similarity measure for fuzzy signatures, which was applied to employee engagement in Hungary and Lithuania. Further, the experts (Chaurasiya and Jain 2022; Banitalebi and Borzooei 2023) introduced an algorithm for solving multi-criteria healthcare waste treatment problems that have been based on the Pythagorean fuzzy entropy measure. ...
This paper delivers three different ways to establish the initial structure of the interval-valued fuzzy signature (IVFSig). In recent years, interval-valued fuzzy set theory has proven more capable of dealing with uncertainty and vagueness than fuzzy set theory due to its increased flexibility. Therefore, the primary goal of this work is to develop an algebraic framework for an IVFSig based on the aspects of an interval-valued fuzzy set (IVFS). First, the IVFSig’s are constructed with the aid of IVFSs, which may be considered the truth values of IVFSs. Second, the families of IVFSig’s, as well as meet and join operators, are formulated, and then their lattice algebraic structure is verified. Third, the relation of partial ordering is established in an IVFSig family. Precisely, the addressed design is compared with recent well-known framework. Finally, the numerical illustrations provide a higher degree of representation than other existing framework.
... To reduce the PKI and certificate dependencies, the notion of identity-based signature (IBS) was first introduced by Shamir [1] in 1984, in which the public key of a user is simplified as his identity (e.g., name, email address, or phone number). This opens the way to more flexible and efficient digital signature schemes [2][3][4][5][6][7]. ...
Attribute-based signature (ABS) assures the verifier that the message is endorsed by a signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide identity authentication with privacy preservation in scenarios like anonymous communication and access control. However, we have found that the inherent delegatibility of attribute-based cryptography, which enables the utilization of relationship between policies, could make most of the existing ABS constructions not satisfy the unforgeability requirement under the common security model. In this paper, we dig into the delegatibility property of ABS for the first time and propose the potential delegation attack to break the unforgeability of the existing ABS constructions under the common security model. We also give two attack instances on a typical ABS construction to demonstrate the feasibility of the proposed delegation attack. Finally, we present two solutions to improve the above issue and give a further discussion about the delegatibility property of ABS.