Sciweavers

326 search results - page 15 / 66
» Digital Signature Scheme Based on a New Hard Problem
Sort
View
CSIE
2009
IEEE
15 years 6 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
ECCC
2010
78views more  ECCC 2010»
14 years 12 months ago
PCPs and the Hardness of Generating Synthetic Data
Assuming the existence of one-way functions, we show that there is no polynomial-time, differentially private algorithm A that takes a database D ({0, 1}d )n and outputs a "...
Jonathan Ullman, Salil P. Vadhan
ISPEC
2005
Springer
15 years 5 months ago
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Patrick P. Tsang, Victor K. Wei
DRM
2008
Springer
15 years 1 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
CCS
2006
ACM
15 years 3 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin