Sciweavers

743 search results - page 41 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
CISC
2007
Springer
117views Cryptology» more  CISC 2007»
14 years 22 days ago
An Efficient ID-Based Proxy Signature Scheme from Pairings
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is onl...
Chunxiang Gu, Yuefei Zhu
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 7 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
14 years 24 days ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay