Sciweavers

1094 search results - page 13 / 219
» List signature schemes
Sort
View
IJNSEC
2010
127views more  IJNSEC 2010»
13 years 4 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
ASIACRYPT
2007
Springer
14 years 4 months ago
Fully Anonymous Group Signatures Without Random Oracles
We construct a new group signature scheme using bilinear groups. The group signature scheme is practical, both keys and group signatures consist of a constant number of group elem...
Jens Groth
ACNS
2003
Springer
80views Cryptology» more  ACNS 2003»
14 years 1 months ago
A Threshold GQ Signature Scheme
We proposed the first threshold GQ signature scheme. The scheme is unforgeable and robust against any adaptive adversary if the base GQ signature scheme is unforgeable under the c...
Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
CIS
2005
Springer
14 years 3 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
ASIACRYPT
2006
Springer
14 years 1 months ago
Analysis of One Popular Group Signature Scheme
The group signature scheme [1], ACJT for short, is popular. In this paper we show that it is not secure. It does not satisfy exculpability. The group manager can sign on behalf of ...
Zhengjun Cao