Sciweavers

346 search results - page 10 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
EUROCRYPT
2012
Springer
13 years 2 months ago
Lattice Signatures without Trapdoors
We provide an alternative method for constructing lattice-based digital signatures which does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan (ST...
Vadim Lyubashevsky
67
Voted
DCC
2002
IEEE
15 years 11 months ago
On the Security of the Digital Signature Algorithm
Ian F. Blake, Theodoulos Garefalakis
FC
2006
Springer
139views Cryptology» more  FC 2006»
15 years 3 months ago
Defeating Malicious Servers in a Blind Signatures Based Voting System
In this paper, we present two failures in the blind signatures based voting system Votopia [2] which has been tested during the last World Soccer Cup. We then propose a fix which r...
Sébastien Canard, Matthieu Gaud, Jacques Tr...
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 3 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 4 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng