Sciweavers

56 search results - page 4 / 12
» Realizing Hash-and-Sign Signatures under Standard Assumption...
Sort
View
AAECC
2009
Springer
110views Algorithms» more  AAECC 2009»
14 years 17 days ago
Novel Efficient Certificateless Aggregate Signatures
We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. The scheme is proven e...
Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
EUROCRYPT
2001
Springer
14 years 1 months ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
BMCBI
2008
144views more  BMCBI 2008»
13 years 8 months ago
Local conservation scores without a priori assumptions on neutral substitution rates
Background: Comparative genomics aims to detect signals of evolutionary conservation as an indicator of functional constraint. Surprisingly, results of the ENCODE project revealed...
Janis Dingel, Pavol Hanus, Niccolò Leonardi...
IACR
2011
101views more  IACR 2011»
12 years 8 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song