Sciweavers

985 search results - page 41 / 197
» On the validity of digital signatures
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
ESORICS
2004
Springer
14 years 2 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 5 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
ASIACRYPT
2004
Springer
14 years 2 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 2 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan