• No results found

Identity-Based Signature Schemes

Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes

Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes

... computer based system, key for the problem of identification, authentication and secrecy can be found in the field of ...prone. Identity based cryptography (IBC) aspires to reduce the certificate and ...

8

A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET

A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET

... Trust third party (TTP): [8] a centralized authority (e.g., a key distribution center [KDC] or certification authority [CA]) is trusted by every entity and an entity A is trusted by another if the authority claims A is ...

9

Galindo-Garcia  Identity-Based  Signature,  Revisited

Galindo-Garcia Identity-Based Signature, Revisited

... RSA based IBS [FS87, GQ90] have been proposed in the literature after the notion of IBS was introduced by Shamir in 1984 ...pairing based constructions were also proposed [CHC02, Her05, Hes03, ...Schnorr’s ...

27

Improved  on  Identity-based  quantum  signature  based  on  Bell  states

Improved on Identity-based quantum signature based on Bell states

... quantum signature related articles have been ...true signature schemes [3, 19], in which the verification can be executed by ...new identity-based quantum signature based ...

6

Security Analysis of Two Lightweight Certificateless Signature Schemes

Security Analysis of Two Lightweight Certificateless Signature Schemes

... and identity- based public key cryptography (ID-PKC) ...the identity of an entity to his public key, ID- PKC requires a trusted private key generator to gen- erate the private keys of users ...

7

Two  attacks  on  rank  metric  code-based  schemes:  RankSign   and  an  Identity-Based-Encryption  scheme

Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme

... secure signature scheme based on the hardness of decoding a linear code which could compete in all respects with DSA or ...Such schemes could indeed give a quantum resistant signature for ...

30

Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme

Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme

... an identity-based signature to revoke users efficiently and se- ...revocable identity-based signature (RIBS) scheme in the standard model and proved that it was strongly ...

13

An Identity-Based Mediated Signature Scheme Without Trusted PKG 

An Identity-Based Mediated Signature Scheme Without Trusted PKG 

... proposed Identity- based mRSA schemes, ...behind identity-based mRSA is the use of a single common RSA modulus n among all users of a ...

8

Security  Pitfalls  of  a  Provably  Secure  Identity-based  Multi-Proxy  Signature  Scheme

Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme

... 5], identity-based multi-proxy signatures [1, 13, 34, 21], identity-based proxy multi- signatures [13, 30, 2, 31, 28] and identity-based multi-proxy multi-signature ...

9

A New Approach to Group Signature Schemes

A New Approach to Group Signature Schemes

... a signature is anonymous. To trace a group signature, the Opener need only store the identity of the signer when providing him signing ...method, based on the famous BLS signature ...

6

Provably Secure Certificate-based Proxy Signature Schemes

Provably Secure Certificate-based Proxy Signature Schemes

... the identity-based cryptography [2], [3]. The certificate-based encryption and signature have attracted a lot of attention since it is ...among identity-based encryption, ...

9

A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES

A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES

... signature schemes possess a great advantage because the needed bandwidth is small. Because of the superior properties of IDS and bilinear pairings, various ID-based applications using bilinear ...

9

AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME

AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME

... the signature and the required compu- tational ...of signature is only 1 | G 1 | + | k |, where | G 1 | is the bit length of element in G 1 and | k | is the bit length of the size of a prime number ...

7

Design of Identity-Based Blind Signature Scheme Upon Chaotic Maps

Design of Identity-Based Blind Signature Scheme Upon Chaotic Maps

... novel IDentity- based Blind Signature (ID-BS) based technique in this paper that relies on a pair of hard number theoretic problems, namely, the Chaotic Maps (CM) and FAC- toring (FAC) ...

15

A Fair Electronic Cash System with Identity Based Group Signature Scheme

A Fair Electronic Cash System with Identity Based Group Signature Scheme

... group signature scheme was proposed by David Chaum and van-Heyst in 1991 ...Group signature schemes allow a group member to sign messages on behalf of the ...the identity of the signer [1-3]. ...

7

Secure and efficient identity-based proxy signature scheme with message recovery

Secure and efficient identity-based proxy signature scheme with message recovery

... Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign ...

26

A Pairing Free Secure Identity-based Aggregate Signature Scheme Under Random Oracle

A Pairing Free Secure Identity-based Aggregate Signature Scheme Under Random Oracle

... The signature aggregation is efficient for the communication links as the time complexity is independent of n different ...pairing-based schemes expose more computational complexity than ...

8

Tighter  Reductions  for  Forward-Secure  Signature  Schemes

Tighter Reductions for Forward-Secure Signature Schemes

... constructing signature schemes is to apply the Fiat- Shamir transform [9] to a secure three-move canonical identification ...accept based on the conversation transcript and the public ...

20

On  The  Security  of  One-Witness  Blind  Signature  Schemes

On The Security of One-Witness Blind Signature Schemes

... What makes our technique particularly interesting is that for the first time we introduce a meta- reduction (our personal nemesis adversary) that does not need to reset the reduction B, as it is usually done when using ...

25

Attacking  Deterministic  Signature  Schemes  using  Fault  Attacks

Attacking Deterministic Signature Schemes using Fault Attacks

... an optimal target either, because Minisign does not mmap the message, but creates an internal copy via malloc/fread. This means that KSM must deduplicate the internally created copy. Furthermore, since the message is ...

21

Show all 10000 documents...

Related subjects