Sciweavers

7 search results - page 2 / 2
» Group-oriented undeniable signature schemes with a trusted c...
Sort
View
CCR
2000
101views more  CCR 2000»
13 years 5 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 9 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena