Sciweavers

21 search results - page 1 / 5
» An efficient dynamic-identity based signature scheme for sec...
Sort
View
CN
2010
73views more  CN 2010»
13 years 5 months ago
An efficient dynamic-identity based signature scheme for secure network coding
Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sher...
INFOCOM
2008
IEEE
13 years 11 months ago
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Gu...
JNW
2006
149views more  JNW 2006»
13 years 4 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 6 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 7 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman