Sciweavers

569 search results - page 6 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
108
Voted
TRUSTBUS
2005
Springer
15 years 8 months ago
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
149
Voted
IJNSEC
2011
239views more  IJNSEC 2011»
14 years 10 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
CSREASAM
2007
15 years 4 months ago
Further Discussions on the Security of a Nominative Signature Scheme
A nominative signature scheme allows a nominator (or signer) and a nominee (or verifier) to jointly generate and publish a signature in such a way that only the nominee can verify...
Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu
CISIM
2007
IEEE
15 years 9 months ago
Universally Composable Key-Evolving Signature
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang