Sciweavers

1094 search results - page 8 / 219
» List signature schemes
Sort
View
ACSW
2004
13 years 11 months ago
On the Security of Some Proxy Blind Signature Schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy ...
Hung-Min Sun, Bin-Tsan Hsieh
ICICS
2001
Springer
14 years 2 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
14 years 2 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky
ASIACRYPT
2009
Springer
14 years 4 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
BMCBI
2008
155views more  BMCBI 2008»
13 years 10 months ago
Extending pathways based on gene lists using InterPro domain signatures
Background: High-throughput technologies like functional screens and gene expression analysis produce extended lists of candidate genes. Gene-Set Enrichment Analysis is a commonly...
Florian Hahne, Alexander Mehrle, Dorit Arlt, Annem...