In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Abstract. In this paper, we give a ļ¬rst example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
We present the ļ¬rst group signature scheme with provable security and signature size O(Ī») bits where the group manager, the group members, and the Open Authority (OA) are all id...