Sciweavers

13 search results - page 2 / 3
» Generic Transformation to Strongly Unforgeable Signatures
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 4 days ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 9 days ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 6 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 1 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...