The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬cient due to ā...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Abstract. ESIGN is an eļ¬cient signature scheme that has been proposed in the early nineties (see [14]). Recently, an eļ¬ort was made to lay ESIGN on ļ¬rm foundations, using the...
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...