搜索结果: 76-90 共查到“军事学 signature schemes”相关记录98条 . 查询时间(0.218 秒)
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
digital signature proxy signature partial delegation with warrant
2009/4/1
Proxy signature is an important cryptographic primitive and has been suggested in
numerous applications. In this paper, we present an attack on the aggregate-signaturebased
proxy signature schemes, ...
Nominative Proxy Signature Schemes
nominative signature proxy signature non-repudiation mobile communication
2009/4/1
In a nominative proxy signature scheme, an original singer delegates
his signing power to a proxy, who generates a nominative signature on
behalf of the original signer. In a nominative proxy signat...
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlyi...
On the security of some nonrepudiable threshold proxy signature schemes with known signers
Cryptography Digital signature Proxy signature
2009/3/27
A (t, n) threshold proxy signature scheme enables an original signer to
delegate the signature authority to a proxy group of n member such that
t or more than t proxy signers can cooperatively sign ...
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
Security Unbalanced Oil Vinegar Signature Schemes
2009/3/27
The Unbalanced Oil and Vinegar scheme (UOV) is a signature
scheme based on multivariate quadratic equations. It uses m equations
and n variables. A total of v of these are called "vinegar variables"...
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Cryptography Digital Signature Ring Signature
2009/3/27
In 2001, Rivest et al. firstly introduced the concept of ring
signatures. A ring signature is a simplified group signature without any
manager. It protects the anonymity of a signer. The first schem...
Provably Secure Delegation-by-Certification Proxy Signature Schemes
digital signature proxy signature bilinear map
2009/3/27
In this paper, we first show that previous proxy signature schemes by delegation
with certificate are not provably secure under adaptive-chosen message
attacks and adaptive-chosen warrant attacks. T...
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
threshold partially blind signature identity-based partially blind signature bilinear pairings
2009/3/26
A blind signature scheme is a protocol for obtaining a digital signature from a signer,but the signer can neither learn the messages he/she sign nor the signatures the recipients obtain afterwards. Pa...
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Group signatures traceable signatures membership revocation
2009/3/26
Group signature schemes are cryptographic systems that
provide revocable anonymity for signers. We propose a group signature
scheme with constant-size public key and signature length that does not
...
Digital signature is one of the most important primitives
in public key cryptography. It provides authenticity, integrity and nonrepudiation
to many kinds of applications. On signer privacy however,...
A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
ID-Based Cryptography Ring Signature Anonymity Linkability
2009/3/5
Since the introduction of Identity-based (ID-based) cryptography
by Shamir in 1984, numerous ID-based signature schemes have
been proposed. In 2001, Rivest et al. introduced ring signature that prov...
Attack on Okamoto et al.’s New Short Signature Schemes
Short Signature Bilinear Pairing Cryptanalysis
2009/2/19
We present an attack on a new short signature scheme from
bilinear pairing proposed by Okamoto et al. at ITCC’05. We show that
any one can derive the secret key of the signer from any two message-
...
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
Trapdoor-free Group Signature Schemes
2009/2/5
Group signature schemes allow a member of a group to sign messages anonymously
on behalf of the group. In the case of later dispute, a designated group manager can revoke the
anonymity and identify ...
A group signature scheme allows a group member of a given group
to sign messages on behalf of the group in an anonymous fashion. In case of a dispute,
however, a designated group manager can reveal ...
Identity Based Strong Designated Verifier Proxy Signature Schemes
Derpartment of Mathematics, University Agra
2008/12/29
The paper proposes four new ID based strong designated
verifier proxy signature (SDVPS) scheme. The schemes are formed by
introducing proxy in ID based SDVS, ID based in SDVPS and ID based
proxy in...