Sciweavers

963 search results - page 8 / 193
» Conditional Digital Signatures
Sort
View
ACSAC
2000
IEEE
15 years 6 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 6 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
DCC
2002
IEEE
16 years 1 months ago
On the Security of the Digital Signature Algorithm
Ian F. Blake, Theodoulos Garefalakis
CSJM
2006
77views more  CSJM 2006»
15 years 2 months ago
An Approach to Shorten Digital Signature Length
A new method is proposed to design short signature schemes based on difficulty of factorizing a composite number n = qr, where q and r are two large primes. Using the method new d...
Nikolay A. Moldovyan
108
Voted
EUROCRYPT
1995
Springer
15 years 5 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter