Sciweavers

IJNSEC
2008
154views more  IJNSEC 2008»
13 years 11 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
IJNSEC
2008
78views more  IJNSEC 2008»
13 years 11 months ago
Fault Tolerant Weighted Voting Algorithms
Agreement algorithms can be categorized in different ways. One categorization of such algorithms is based on whether the final decisions are exact or inexact. In inexact algorithm...
Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar
IJNSEC
2008
112views more  IJNSEC 2008»
13 years 11 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 11 months ago
Cryptanalysis of Syverson's Rational Exchange Protocol
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence o...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IJNSEC
2008
87views more  IJNSEC 2008»
13 years 11 months ago
On the Security of ''Golden'' Cryptography
In this paper the security of "golden" cryptography, which has been proposed recently, is tackled. Specifically, it is shown that the security of such cryptosystem is tr...
Ángel Martín del Rey, Gerardo Rodr&i...
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 11 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 11 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 11 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 11 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...