Sciweavers

787 search results - page 5 / 158
» Subversion-Resilient Signature Schemes
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 9 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 9 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
13 years 9 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...
PKC
1998
Springer
103views Cryptology» more  PKC 1998»
14 years 2 months ago
A Scheme for Obtaining a Message from the Digital Multisignature
A new digital multisignature scheme shall be proposed in this paper to allow some members of a group signing the same document and sending it to the receiver, who in turn shall ve...
Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, We...
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Time-Selective Convertible Undeniable Signatures
Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
Fabien Laguillaumie, Damien Vergnaud