Sciweavers

530 search results - page 18 / 106
» Practical Threshold Signatures
Sort
View
ESORICS
2005
Springer
15 years 6 months ago
Sanitizable Signatures
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows author...
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeir...
97
Voted
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 2 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
114
Voted
IACR
2011
146views more  IACR 2011»
14 years 1 days ago
Identity-based Digital Signature Scheme Without Bilinear Pairings
: Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher th...
Debiao He, Jianhua Chen, Jin Hu
98
Voted
AMC
2005
138views more  AMC 2005»
15 years 9 days ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
ICFP
1997
ACM
15 years 4 months ago
A Practical Subtyping System For Erlang
We present a type system for the programming language Erlang. The type system supports subtyping and declarationfree recursive types, using subtyping constraints. Our system is si...
Simon Marlow, Philip Wadler