Sciweavers

139 search results - page 1 / 28
» On the Security of Two Key-Updating Signature Schemes
Sort
View
ACISP
2005
Springer
13 years 10 months ago
On the Security of Two Key-Updating Signature Schemes
Xingyang Guo, Quan Zhang, Chaojing Tang
EUROPKI
2008
Springer
13 years 6 months ago
Efficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previous...
Basel Alomair, Krishna Sampigethaya, Radha Poovend...
ESORICS
2006
Springer
13 years 8 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
13 years 9 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
ACISP
2005
Springer
13 years 10 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...