Sciweavers

1094 search results - page 51 / 219
» List signature schemes
Sort
View
EUROCRYPT
2001
Springer
14 years 2 months ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 4 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
EUROCRYPT
2011
Springer
13 years 1 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman
NAR
2010
159views more  NAR 2010»
13 years 4 months ago
GeneSigDB - a curated database of gene expression signatures
The primary objective of most gene expression studies is the identification of one or more gene signatures; lists of genes whose transcriptional levels are uniquely associated wit...
Aedín C. Culhane, Thomas Schwarzl, Razvan S...
CCS
2004
ACM
14 years 3 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen