Sciweavers

43 search results - page 2 / 9
» Batch Pairing Delegation
Sort
View
89
Voted
IMA
2007
Springer
104views Cryptology» more  IMA 2007»
15 years 8 months ago
Finding Invalid Signatures in Pairing-Based Batches
Laurie Law, Brian J. Matt
ATC
2007
Springer
15 years 8 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 7 days ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
130
Voted
EUROPKI
2005
Springer
15 years 7 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...
EUROCRYPT
2010
Springer
15 years 6 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...