Sciweavers

113 search results - page 16 / 23
» Provable Security of ID-Based Proxy Signature Schemes
Sort
View
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 3 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬ƒcient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
CCS
2004
ACM
14 years 3 days ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
ASIACRYPT
2003
Springer
13 years 12 months ago
Almost Uniform Density of Power Residues and the Provable Security of ESIGN
Abstract. ESIGN is an eļ¬ƒcient signature scheme that has been proposed in the early nineties (see [14]). Recently, an eļ¬€ort was made to lay ESIGN on ļ¬rm foundations, using the...
Tatsuaki Okamoto, Jacques Stern
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
14 years 7 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 2 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes