Sciweavers

284 search results - page 5 / 57
» Securing digital signatures for non-repudiation
Sort
View
108
Voted
WWW
2003
ACM
16 years 2 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
109
Voted
ACISP
2003
Springer
15 years 5 months ago
Digital Signature Schemes with Restriction on Signing Capability
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member may be allowed to generate signatures up to a certain numb...
Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jo...
CISC
2009
Springer
171views Cryptology» more  CISC 2009»
14 years 11 months ago
Sanitizable Signatures with Strong Transparency in the Standard Model
Sanitizable signatures provide several security features which are useful in many scenarios including military and medical applications. Sanitizable signatures allow a semi-trusted...
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. P...
109
Voted
ISW
2004
Springer
15 years 7 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz
TRUSTBUS
2005
Springer
15 years 7 months ago
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...