Sciweavers

98 search results - page 9 / 20
» Undetachable Threshold Signatures
Sort
View
59
Voted
CSI
2004
97views more  CSI 2004»
14 years 9 months ago
Improvement of threshold proxy signature scheme
Zuhua Shao
JISE
2002
86views more  JISE 2002»
14 years 9 months ago
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm
Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu
EUROCRYPT
2008
Springer
14 years 11 months ago
Threshold RSA for Dynamic and Ad-Hoc Groups
Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
TIFS
2010
130views more  TIFS 2010»
14 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
90
Voted
ICISC
2004
147views Cryptology» more  ICISC 2004»
14 years 11 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim