Sciweavers

177 search results - page 5 / 36
» On the Security of Identity Based Ring Signcryption Schemes
Sort
View
DCC
2005
IEEE
15 years 9 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
99
Voted
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 3 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 1 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
95
Voted
ACISP
2007
Springer
15 years 3 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
99
Voted
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
15 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri