Sciweavers

1190 search results - page 95 / 238
» Secure off-the-record messaging
Sort
View
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
15 years 11 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert
ATC
2007
Springer
15 years 11 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
CCS
2005
ACM
15 years 10 months ago
On fairness in simulatability-based cryptographic systems
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simula...
Michael Backes, Dennis Hofheinz, Jörn Mü...
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
ASIACRYPT
2003
Springer
15 years 10 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...