Sciweavers

121 search results - page 9 / 25
» A Ring Signature Scheme Using Bilinear Pairings
Sort
View
CSI
2008
75views more  CSI 2008»
13 years 9 months ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
ITCC
2005
IEEE
14 years 3 months ago
A Proposal of Short Proxy Signature using Pairing
— In this paper, we propose a new pairing-based proxy signature. Most remarkable point in our proposal is that our scheme realizes short signature. More concretely, the explicit ...
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 9 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
MDAI
2005
Springer
14 years 3 months ago
Cryptosystems Based on Elliptic Curve Pairing
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...
Eiji Okamoto, Takeshi Okamoto
EUROPKI
2004
Springer
14 years 3 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...