Sciweavers

155 search results - page 12 / 31
» Hash Based Digital Signature Schemes
Sort
View
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 4 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
15 years 5 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
15 years 3 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
ICICS
2001
Springer
15 years 4 months ago
A Digital Nominative Proxy Signature Scheme for Mobile Communication
Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today’s sys...
Hee-Un Park, Im-Yeong Lee
IJNSEC
2007
118views more  IJNSEC 2007»
14 years 11 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen