Sciweavers

209 search results - page 22 / 42
» A Forward-Secure Digital Signature Scheme
Sort
View
CCS
2006
ACM
13 years 11 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
13 years 11 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
EUROCRYPT
2004
Springer
14 years 1 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
13 years 7 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya