Sciweavers

147 search results - page 8 / 30
» Logarithmic keying
Sort
View
JOC
2006
116views more  JOC 2006»
13 years 9 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
EUROCRYPT
1999
Springer
14 years 2 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 9 months ago
Algorithms and Approaches of Proxy Signature: A Survey
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable pr...
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
ISSAC
2009
Springer
121views Mathematics» more  ISSAC 2009»
14 years 4 months ago
Faster real feasibility via circuit discriminants
We show that detecting real roots for honestly n-variate (n + 2)-nomials (with integer exponents and coefficients) can be done in time polynomial in the sparse encoding for any ï¬...
Frédéric Bihan, J. Maurice Rojas, Ca...
NDSS
2000
IEEE
14 years 2 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin