Sciweavers

241 search results - page 7 / 49
» Machine-Checked Security Proofs of Cryptographic Signature S...
Sort
View
123
Voted
IJNSEC
2006
122views more  IJNSEC 2006»
15 years 3 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao
122
Voted
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
15 years 10 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
145
Voted
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
15 years 8 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval
EUROCRYPT
2004
Springer
15 years 9 months ago
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare, Chanathip Namprempre, Gregory Neven
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...