Sciweavers

790 search results - page 14 / 158
» Hierarchical Group Signatures
Sort
View
SCN
2010
Springer
176views Communications» more  SCN 2010»
13 years 5 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
BIOTECHNO
2008
IEEE
14 years 1 months ago
Grouping Levels of Exposure with Same Observable Effects before Class Prediction in Toxicogenomics
—Gene expression profiling in toxicogenomics is often used to find molecular signature of toxicants. The range of doses chosen in toxicogenomics studies does not always represe...
Vincent Guillemot, Cathy Philippe, Arthur Tenenhau...
ISW
2004
Springer
14 years 22 days ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 24 days ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 7 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...