• No results found

[PDF] Top 20 Efficient identity-based threshold signature scheme from bilinear pairings in the standard model

Has 10000 "Efficient identity-based threshold signature scheme from bilinear pairings in the standard model" found on our website. Below are the top 20 most common "Efficient identity-based threshold signature scheme from bilinear pairings in the standard model".

Efficient  identity-based  threshold  signature   scheme  from  bilinear  pairings  in  the  standard  model

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model

... of threshold signatures [1]. In a (t, n) threshold signature scheme, a secret key (and equivalently, the signing power) is distributed to a group of n players in a way that any subset of t ... See full document

17

Provably Secure Proxy Multi-Signature Scheme Based on ECC

Provably Secure Proxy Multi-Signature Scheme Based on ECC

... curve bilinear pairings also. All of these schemes from pairings except [20] are proven secure in the random oracle model ...the standard model ...the scheme [22] ... See full document

6

ID-Based Directed Blind Signature Scheme from Bilinear Pairings.

ID-Based Directed Blind Signature Scheme from Bilinear Pairings.

... Blind Signature Scheme (ID-DBS) from bilinear ...This scheme allows a a user to obtain a signature on a message without revealing anything about the message to the signer; and ... See full document

6

A  Non-delegatable  Identity-based  Designated  Verifier  Signature  Scheme  without  Bilinear  Pairings

A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings

... non-delegatable identity-based (strong) designated ver- ifier signature schemes using bilinear pairings are ...these identity-based (strong) designated verifier ... See full document

14

An Efficient ID based Proxy Signcryption Scheme without Bilinear Pairings

An Efficient ID based Proxy Signcryption Scheme without Bilinear Pairings

... Signcryption based on elliptic curves provides the same level of security using smaller keys compared to schemes based on the discrete logarithm problem over finite ...fields. Identity-based ... See full document

6

Efficient  Group  Signature  Scheme  without  Pairings

Efficient Group Signature Scheme without Pairings

... of identity-based cryptography [21,22,23,24], some researchers proposed many identity-based signature schemes in the random oracle model or standard model ...these ... See full document

36

Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications

Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications

... in identity based cryptography and certificateless public cryptography, some researchers have successfully construct their schemes [13-16] without ...an efficient identity based ... See full document

5

Shorter  IBE   and  Signatures  via  Asymmetric  Pairings

Shorter IBE and Signatures via Asymmetric Pairings

... IBE scheme be as efficient as possible, if it were to have any impact on practical ...the scheme should ideally achieve full security, namely to be resilient even against an adversary that adaptively selects ... See full document

40

A Review on Distributed System Security using Elliptic Curve Cryptography

A Review on Distributed System Security using Elliptic Curve Cryptography

... Proxy signature is being discussed today for much application such as distributed system and grid computing and some identity based proxy signature scheme are presented in concurrent ... See full document

6

AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME

AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME

... verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a ... See full document

7

An Efficient Certificateless Threshold Decryption Schemes Based On Pairings

An Efficient Certificateless Threshold Decryption Schemes Based On Pairings

... the bilinear group through simply sharing an element in the finite ...involved pairings is very little. In other words, for the bilinear pairing tool, its advantage of good algebraic structure for ... See full document

10

Secure and efficient identity-based proxy signature scheme with message recovery

Secure and efficient identity-based proxy signature scheme with message recovery

... an efficient ID-based proxy signature scheme with message recovery based on bilinear ...proposed scheme can be implemented across a broad range of practical applications ... See full document

26

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings

... generated signature length from different short signature ...BLS signature generation algorithm produces a signature size of ( ), 4 3 2 respectively to achieve a security level of ... See full document

5

Efficient  Leakage-Resilient  Signature  Schemes  in  the  Generic  Bilinear  Group  Model

Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model

... proposed based on various leakage ...the standard model without any idealized assumption ...quite efficient to be used in practice. Such as the signature schemes [23, 18, 6, 7, 28, 20, ... See full document

20

Efficient  identity-based  threshold  decryption   scheme  from  bilinear  pairings

Efficient identity-based threshold decryption scheme from bilinear pairings

... IBTD scheme IdThdBm, we derive a non-ID-based threshold decryption scheme called “ThdBm” from IdThdB- m, which will be described ...the scheme ThdBm, which will be defined after ... See full document

18

Generic Construction of Forward-Secure Identity- Based Encryption

Generic Construction of Forward-Secure Identity- Based Encryption

... forward-secure identity-based encryption was proposed in order to minimize the damage of private key exposure in identity-based encryption ...secure identity-based ... See full document

7

Function  Private  Predicate  Encryption  for  Low  Min-Entropy  Predicates

Function Private Predicate Encryption for Low Min-Entropy Predicates

... SME, the implication does not extend to function privacy. In fact, defining function privacy for HVE itself is tricky given the presence of wildcard characters. We overcome this issue by presenting a weaker notion of ... See full document

34

A  Multivariate  based  Threshold  Ring  Signature  Scheme

A Multivariate based Threshold Ring Signature Scheme

... the threshold identification scheme with probability 3 4 ...identification scheme of [16], which is zero knowledge. Since the commitment scheme is statistically hiding, the two additional com- ... See full document

16

Constant  Size  Traceable  Ring  Signature  Scheme  without  Random  Oracles

Constant Size Traceable Ring Signature Scheme without Random Oracles

... Ring signature is a useful cryptographic primitive for many anonymous applications, which makes a signer sign any message ...ring signature allows that ring member signs any message without revealing ... See full document

31

An  FPGA-based  programmable  processor  for  bilinear  pairings

An FPGA-based programmable processor for bilinear pairings

... Bilinear pairings on elliptic curves are an active research field in cryp- ...protocols based on bilinear pairings were proposed by the year 2000 and they are promising solutions to ... See full document

32

Show all 10000 documents...