Sciweavers

369 search results - page 4 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
ICICS
2001
Springer
13 years 12 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd
ICC
2007
IEEE
169views Communications» more  ICC 2007»
14 years 1 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
ASIACRYPT
2006
Springer
13 years 11 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 8 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
WISA
2005
Springer
14 years 27 days ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park