Sciweavers

369 search results - page 20 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
ASIACRYPT
2010
Springer
14 years 9 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
15 years 6 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 9 days ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
15 years 5 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
15 years 4 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang