Sciweavers

1094 search results - page 44 / 219
» List signature schemes
Sort
View
IJISEC
2010
150views more  IJISEC 2010»
13 years 7 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
14 years 2 months ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
ICALP
2007
Springer
14 years 4 months ago
Ring Signatures of Sub-linear Size Without Random Oracles
Ring signatures, introduced by Rivest, Shamir and Tauman, enable a user to sign a message anonymously on behalf of a “ring”. A ring is a group of users, which includes the sign...
Nishanth Chandran, Jens Groth, Amit Sahai
ASIACRYPT
2001
Springer
14 years 2 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
ASIACRYPT
2003
Springer
14 years 1 months ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros