Sciweavers

284 search results - page 13 / 57
» A New Key-Insulated Signature Scheme
Sort
View
DCC
2003
IEEE
14 years 7 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 9 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 9 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
14 years 8 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
IEEEIAS
2009
IEEE
13 years 5 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng