Sciweavers

787 search results - page 56 / 158
» Subversion-Resilient Signature Schemes
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 7 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
89
Voted
ASIACRYPT
2004
Springer
15 years 6 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
108
Voted
SAC
2004
ACM
15 years 6 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
92
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Concurrent Signatures
We introduce the concept of concurrent signatures. These allow two entities to produce two signatures in such a way that, from the point of view of any third party, both signatures...
Liqun Chen, Caroline Kudla, Kenneth G. Paterson
87
Voted
JOC
2002
114views more  JOC 2002»
15 years 14 days ago
Improving the Exact Security of Digital Signature Schemes
We put forward a new method of constructing Fiat-Shamir-like signature schemes that yields better "exact security" than the original Fiat-Shamir method. (We also point o...
Silvio Micali, Leonid Reyzin