Sciweavers

76 search results - page 1 / 16
» Confirmer Signature Schemes Secure against Adaptive Adversar...
Sort
View
EUROCRYPT
2000
Springer
13 years 8 months ago
Confirmer Signature Schemes Secure against Adaptive Adversaries
Jan Camenisch, Markus Michels
IJACT
2010
67views more  IJACT 2010»
12 years 11 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
ASIACRYPT
2001
Springer
13 years 9 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
IJNSEC
2011
128views more  IJNSEC 2011»
12 years 11 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
13 years 10 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie