[PDF] Top 20 Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Has 10000 "Efficient identity-based threshold signature scheme from bilinear pairings in the standard model" found on our website. Below are the top 20 most common "Efficient identity-based threshold signature scheme from bilinear pairings in the standard model".
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
... of threshold signatures [1]. In a (t, n) threshold signature scheme, a secret key (and equivalently, the signing power) is distributed to a group of n players in a way that any subset of t ... See full document
17
Provably Secure Proxy Multi-Signature Scheme Based on ECC
... curve bilinear pairings also. All of these schemes from pairings except [20] are proven secure in the random oracle model ...the standard model ...the scheme [22] ... See full document
6
ID-Based Directed Blind Signature Scheme from Bilinear Pairings.
... Blind Signature Scheme (ID-DBS) from bilinear ...This scheme allows a a user to obtain a signature on a message without revealing anything about the message to the signer; and ... See full document
6
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
... non-delegatable identity-based (strong) designated ver- ifier signature schemes using bilinear pairings are ...these identity-based (strong) designated verifier ... See full document
14
An Efficient ID based Proxy Signcryption Scheme without Bilinear Pairings
... Signcryption based on elliptic curves provides the same level of security using smaller keys compared to schemes based on the discrete logarithm problem over finite ...fields. Identity-based ... See full document
6
Efficient Group Signature Scheme without Pairings
... of identity-based cryptography [21,22,23,24], some researchers proposed many identity-based signature schemes in the random oracle model or standard model ...these ... See full document
36
Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications
... in identity based cryptography and certificateless public cryptography, some researchers have successfully construct their schemes [13-16] without ...an efficient identity based ... See full document
5
Shorter IBE and Signatures via Asymmetric Pairings
... IBE scheme be as efficient as possible, if it were to have any impact on practical ...the scheme should ideally achieve full security, namely to be resilient even against an adversary that adaptively selects ... See full document
40
A Review on Distributed System Security using Elliptic Curve Cryptography
... Proxy signature is being discussed today for much application such as distributed system and grid computing and some identity based proxy signature scheme are presented in concurrent ... See full document
6
AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
... verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a ... See full document
7
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings
... the bilinear group through simply sharing an element in the finite ...involved pairings is very little. In other words, for the bilinear pairing tool, its advantage of good algebraic structure for ... See full document
10
Secure and efficient identity-based proxy signature scheme with message recovery
... an efficient ID-based proxy signature scheme with message recovery based on bilinear ...proposed scheme can be implemented across a broad range of practical applications ... See full document
26
An Efficient Key Escrow-Free Identity-based Short Signature Scheme from Bilinear Pairings
... generated signature length from different short signature ...BLS signature generation algorithm produces a signature size of ( ), 4 3 2 respectively to achieve a security level of ... See full document
5
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
... proposed based on various leakage ...the standard model without any idealized assumption ...quite efficient to be used in practice. Such as the signature schemes [23, 18, 6, 7, 28, 20, ... See full document
20
Efficient identity-based threshold decryption scheme from bilinear pairings
... IBTD scheme IdThdBm, we derive a non-ID-based threshold decryption scheme called “ThdBm” from IdThdB- m, which will be described ...the scheme ThdBm, which will be defined after ... See full document
18
Generic Construction of Forward-Secure Identity- Based Encryption
... forward-secure identity-based encryption was proposed in order to minimize the damage of private key exposure in identity-based encryption ...secure identity-based ... See full document
7
Function Private Predicate Encryption for Low Min-Entropy Predicates
... SME, the implication does not extend to function privacy. In fact, defining function privacy for HVE itself is tricky given the presence of wildcard characters. We overcome this issue by presenting a weaker notion of ... See full document
34
A Multivariate based Threshold Ring Signature Scheme
... the threshold identification scheme with probability 3 4 ...identification scheme of [16], which is zero knowledge. Since the commitment scheme is statistically hiding, the two additional com- ... See full document
16
Constant Size Traceable Ring Signature Scheme without Random Oracles
... Ring signature is a useful cryptographic primitive for many anonymous applications, which makes a signer sign any message ...ring signature allows that ring member signs any message without revealing ... See full document
31
An FPGA-based programmable processor for bilinear pairings
... Bilinear pairings on elliptic curves are an active research field in cryp- ...protocols based on bilinear pairings were proposed by the year 2000 and they are promising solutions to ... See full document
32
Related subjects