Sciweavers

37 search results - page 7 / 8
» Undeniable Signatures
Sort
View
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
13 years 9 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
CRYPTO
1998
Springer
106views Cryptology» more  CRYPTO 1998»
13 years 10 months ago
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Verifiable Signature Sharing (VS ) enables the recipient of a digital signature, who is not necessarily the original signer, to share such signature among n proxies so that a subse...
Dario Catalano, Rosario Gennaro
CSCWD
2008
Springer
13 years 7 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
13 years 10 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval