Sciweavers

98 search results - page 11 / 20
» Threshold Proxy Signature Schemes
Sort
View
ICICS
2001
Springer
13 years 12 months ago
A Digital Nominative Proxy Signature Scheme for Mobile Communication
Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today’s sys...
Hee-Un Park, Im-Yeong Lee
ASIACRYPT
2001
Springer
14 years 1 days ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
EUROCRYPT
2006
Springer
13 years 11 months ago
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles. Our constructions derive f...
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shac...
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 9 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
14 years 1 days ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...