Sciweavers

76 search results - page 1 / 16
» Confirmer Signature Schemes Secure against Adaptive Adversar...
Sort
View
EUROCRYPT
2000
Springer
15 years 7 months ago
Confirmer Signature Schemes Secure against Adaptive Adversaries
Jan Camenisch, Markus Michels
117
Voted
IJACT
2010
67views more  IJACT 2010»
14 years 10 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
ASIACRYPT
2001
Springer
15 years 8 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
130
Voted
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 10 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
136
Voted
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 8 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie