Sciweavers

262 search results - page 24 / 53
» Proposal of a Signature Scheme Based on STS Trapdoor
Sort
View
90
Voted
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
14 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
CISC
2007
Springer
117views Cryptology» more  CISC 2007»
15 years 1 months ago
An Efficient ID-Based Proxy Signature Scheme from Pairings
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is onl...
Chunxiang Gu, Yuefei Zhu
103
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
IJNSEC
2006
113views more  IJNSEC 2006»
14 years 9 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
15 years 10 months ago
Signing a Linear Subspace: Signature Schemes for Network Coding
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, netw...
Dan Boneh, David Freeman, Jonathan Katz, Brent Wat...