Sciweavers

569 search results - page 6 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
TRUSTBUS
2005
Springer
14 years 1 months ago
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
IJNSEC
2011
239views more  IJNSEC 2011»
13 years 3 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
CCS
2008
ACM
13 years 10 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
CSREASAM
2007
13 years 10 months ago
Further Discussions on the Security of a Nominative Signature Scheme
A nominative signature scheme allows a nominator (or signer) and a nominee (or verifier) to jointly generate and publish a signature in such a way that only the nominee can verify...
Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu
CISIM
2007
IEEE
14 years 2 months ago
Universally Composable Key-Evolving Signature
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang