Sciweavers

220 search results - page 6 / 44
» Formally Certifying the Security of Digital Signature Scheme...
Sort
View
ACSAC
2000
IEEE
14 years 4 days ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ISPEC
2005
Springer
14 years 1 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
EUROPKI
2007
Springer
14 years 1 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
EUROCRYPT
2004
Springer
14 years 1 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
ACSW
2004
13 years 9 months ago
On the Security of Some Proxy Blind Signature Schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy ...
Hung-Min Sun, Bin-Tsan Hsieh