Sciweavers

178 search results - page 5 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
82
Voted
IJNSEC
2007
138views more  IJNSEC 2007»
14 years 9 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
SCN
2008
Springer
105views Communications» more  SCN 2008»
14 years 9 months ago
Expressive Subgroup Signatures
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
Xavier Boyen, Cécile Delerablée
ISW
2004
Springer
15 years 2 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
CORR
2010
Springer
75views Education» more  CORR 2010»
14 years 9 months ago
An Optimal Family of Exponentially Accurate One-Bit Sigma-Delta Quantization Schemes
Sigma-Delta modulation is a popular method for analog-to-digital conversion of bandlimited signals that employs coarse quantization coupled with oversampling. The standard mathema...
Percy Deift, C. Sinan Güntürk, Felix Kra...
ASIACRYPT
2000
Springer
15 years 1 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung