Sciweavers

136 search results - page 24 / 28
» Threshold Cryptosystems Secure against Chosen-Ciphertext Att...
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 5 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 8 days ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
ASIACRYPT
2004
Springer
14 years 5 days ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
TPDS
2010
142views more  TPDS 2010»
13 years 5 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
13 years 6 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...