• No results found

short group signature scheme

Efficient  Group  Signature  Scheme  without  Pairings

Efficient Group Signature Scheme without Pairings

... Group signature [1] allows group member (signer) to hide his identifying information to a group when group member signs messages, thus group signature only reveals the ...

36

Efficient  Leakage-Resilient  Signature  Schemes  in  the  Generic  Bilinear  Group  Model

Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model

... leakage-resilient signature schemes. Our schemes based on Boneh-Lynn- Shacham (BLS) short signature and Waters signature schemes, ...al.’s scheme, and can tolerate leakage of (1 − ...

20

Floppy-Sized  Group  Signatures  from  Lattices

Floppy-Sized Group Signatures from Lattices

... lattice-based group signature scheme whose cryptographic artifacts are of size small enough to be usable in practice: for a group of 2 25 users, signatures take 910 kB and public keys are 501 ...

19

System for Anonymous Data Collection Based on Group Signature Scheme

System for Anonymous Data Collection Based on Group Signature Scheme

... a short timer and call to GPS listener for geographic ...real signature that incorporates parameters separate from each other in same way like ...HM12 signature scheme is discussed ...

11

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

... identity-based short signature scheme from bilinear pairings has been ...generated signature of the proposed scheme is short because the signature is consists of one ...

5

A Practical ID-Based Group Signature Scheme

A Practical ID-Based Group Signature Scheme

... ID-based group signature scheme, in which group managers (Membership Manager and Tracing Manager) and group members are all ID-based, is presented in this ...of group ...

5

A New Approach to Group Signature Schemes

A New Approach to Group Signature Schemes

... to group signature ...to group members. Using this method, Based on the famous BLS signature scheme from bilinear pairings, we put forward a new group signature ...our ...

6

Simple  Schnorr  Multi-Signatures  with  Applications  to  Bitcoin

Simple Schnorr Multi-Signatures with Applications to Bitcoin

... multi-signature scheme (i.e., a protocol which allows a group of signers to produce a short, joint signature on a common message) called MuSig, provably secure in the plain public-key ...

34

A New Signature Scheme Define over a Class of Non-Abelian Group

A New Signature Scheme Define over a Class of Non-Abelian Group

... abelian group (more precisely, finite cyclic groups) (Fiat et ...various signature schemes to become vulnerable to various ...the group-based cryptography. In short, this direction of studies ...

8

PRIVACY PRESERVATION AGAINST COLLUDING ATTACK USING GROUP SIGNATURE SCHEME

PRIVACY PRESERVATION AGAINST COLLUDING ATTACK USING GROUP SIGNATURE SCHEME

... of signature is to preserve signer’s anonymity, yet allow the manager to reveal the identity in legal dispute through the open ...The group signature with verifiable opening has five polynomial ...

12

Efficient  Group  Signatures  in  the  Standard  Model

Efficient Group Signatures in the Standard Model

... Tag-based encryption, also referred to as encryption with labels, was first introduced in [22]. In these schemes, the encryption algorithm takes as input, in addition to the public key pk and the message m intended to be ...

23

G-Merkle:  A  Hash-Based  Group  Signature  Scheme  From  Standard  Assumptions

G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions

... of group members (also called users) to facilitate the comparison of dif- ferent tree heights (but other values are possible, given the trade-off between group members and number of ...XMSS signature ...

20

LOAD CURRENT CONTROL BASED ON LUENBERGER OBSERVER FOR THREE PHASE POWER 
CONVERTER SVPWM

LOAD CURRENT CONTROL BASED ON LUENBERGER OBSERVER FOR THREE PHASE POWER CONVERTER SVPWM

... security scheme for dynamic group, with the generalized non- interactive zero-knowledge proof technology, which was ...practicality, group signature schemes under the standard model must be ...

7

Tightly  Secure  Signatures   and  Public-Key  Encryption

Tightly Secure Signatures and Public-Key Encryption

... Another way to show IND-CCA security is to argue with the information the adversary has about the secret key. (Examples of this approach are [19, 20, 43].) Since the size of the secret key is limited, its entropy can ...

35

Online/Off-line  Ring  Signature  Scheme  with  Provable  Security

Online/Off-line Ring Signature Scheme with Provable Security

... Ring Signature Scheme in random oracle model.Security of the scheme relies on both Computational Diffie-Hellman and k-CAA ...proposed scheme is proven the two most important security goals Exis- ...

12

A  Provably  Secure  Group  Signature  Scheme  from  Code-Based  Assumptions

A Provably Secure Group Signature Scheme from Code-Based Assumptions

... and signature sizes, and no implementation result has been ...post-quantum group signatures one step closer to prac- tice; Second, bringing in more diversity with a scheme from another candidate for ...

28

Title: PREVENTION OF COLLUDING ATTACK USING GROUP SIGNATURE STRATEGY

Title: PREVENTION OF COLLUDING ATTACK USING GROUP SIGNATURE STRATEGY

... the group coalition is another security ...the group manager is responsible in distributing many security parameters between members, which is a very critical role where collusion is possible, secondly the ...

7

Road-to-Vehicle  Communications  with  Time-Dependent  Anonymity:  A  Light  Weight  Construction   and  its  Experimental  Results

Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results

... utilize group signatures with time-token dependent linking (GS-TDL), which we propose in this ...as short as possible, then GS-TDL comes close to usual group signatures ...

24

Review of Authentication in Roaming Service

Review of Authentication in Roaming Service

... a group signature scheme as a primitive for both anonymous authentication of user and premature ...revocation. Group signature allows a member of a group to sign messages on ...

6

Digital Signature Scheme for Image

Digital Signature Scheme for Image

... proposed scheme against several acceptable manipulations, experiments are conducted by mounting a variety of ...digital signature was consistently very high for incidental manipulations when ...

6

Show all 10000 documents...

Related subjects