Sciweavers

77 search results - page 6 / 16
» Security of Blind Signatures Revisited
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
13 years 11 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
FC
2006
Springer
153views Cryptology» more  FC 2006»
13 years 11 months ago
Revisiting Oblivious Signature-Based Envelopes
Secure, anonymous and unobservable communication is becoming increasingly important due to the gradual erosion of privacy in many aspects of everyday life. This prompts the need f...
Samad Nasserian, Gene Tsudik
ICICS
2003
Springer
14 years 18 days ago
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim