Sciweavers

248 search results - page 7 / 50
» Fault Attacks on Signature Schemes
Sort
View
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 7 months ago
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this article, we show that the scheme is not secure. ...
Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-M...
ICCSA
2005
Springer
14 years 28 days ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 7 months ago
Security Analysis of Some Batch Verifying Signatures from Pairings
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from...
Tianjie Cao, Dongdai Lin, Rui Xue
INFOCOM
2008
IEEE
14 years 1 months ago
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Gu...