We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
Abstract. Identity-Based Encryption (IBE) oļ¬ers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certiļ¬cates. While revocation has bee...
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can...