Sciweavers

116 search results - page 9 / 24
» Secure Vehicular Communications Based on Group Signature and...
Sort
View
WCNC
2008
IEEE
14 years 1 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
ICICS
2003
Springer
14 years 15 days ago
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 21 days ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
ASIACRYPT
2001
Springer
13 years 11 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 4 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin