Sciweavers

787 search results - page 67 / 158
» Subversion-Resilient Signature Schemes
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
14 years 11 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
IACR
2011
129views more  IACR 2011»
13 years 9 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
14 years 7 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
14 years 19 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
93
Voted
EUROCRYPT
2004
Springer
15 years 3 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung