Sciweavers

1094 search results - page 22 / 219
» List signature schemes
Sort
View
IJSN
2006
96views more  IJSN 2006»
13 years 9 months ago
A new signature scheme without random oracles
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
Chik How Tan
IEEEICCI
2008
IEEE
14 years 4 months ago
Improved offline signature verification scheme using feature point extraction method
In this paper a novel offline signature verification scheme has been proposed. The scheme is based on selecting 60 feature points from the geometric centre of the signature and co...
Debasish Jena, Banshidhar Majhi, Saroj Kumar Panig...
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
ISW
1997
Springer
14 years 2 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang
WETICE
2002
IEEE
14 years 2 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei