Sciweavers

743 search results - page 34 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
IJNSEC
2008
107views more  IJNSEC 2008»
13 years 8 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 5 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
EUROPKI
2004
Springer
14 years 2 months ago
Mobile Qualified Electronic Signatures and Certification on Demand
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promisin...
Heiko Rossnagel
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 10 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
14 years 29 days ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng