Sciweavers

54 search results - page 3 / 11
» Security of a multisignature scheme for specified group of v...
Sort
View
CIS
2007
Springer
14 years 1 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
FUIN
2008
82views more  FUIN 2008»
13 years 7 months ago
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in ...
Muhammad Torabi Dashti, Srijith Krishnan Nair, Hug...
ACISP
2003
Springer
13 years 11 months ago
Grouping Verifiable Content for Selective Disclosure
Abstract. This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more ...
Laurence Bull, David McG. Squire, Jan Newmarch, Yu...
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 7 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
IJNSEC
2011
128views more  IJNSEC 2011»
13 years 2 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao