Sciweavers

446 search results - page 30 / 90
» On Anonymity of Group Signatures
Sort
View
COMPSEC
2004
99views more  COMPSEC 2004»
14 years 11 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
14 years 10 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
JOC
2000
181views more  JOC 2000»
14 years 11 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
INFOCOM
2010
IEEE
14 years 10 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
MOC
1998
87views more  MOC 1998»
14 years 11 months ago
Tables of unit groups and class groups of quintic fields and a regulator bound
Using a new regulator bound we determine unit groups and class groups of the 289040 quintic algebraic number fields with absolute discriminant less than 2 × 107 (totally real fi...
Michael E. Pohst, K. Wildanger