نتایج جستجو برای: convertible limited multi verifier signature

تعداد نتایج: 931198  

2010
Keita Emura Atsuko Miyaji Kazumasa Omote

There are many cryptographic schemes with anonymity, such as group signatures. As one important property, anonymity revocation has been introduced. In such schemes, the fact of whether a signer’s rights have been revoked or not is important additional information. For example, if a third party knows that there are many revoked members in a company, then the company’s reputation may be damaged i...

2010
R. Arshad

An authenticated encryption allows the specific recipient to verify the authenticity while recovering the message. To protect the recipient’s interest in case of a later dispute, a convertible authenticated encryption scheme allows the specific recipient to retrieve an authenticated cipher text and convert the authenticated ciphertext into an ordinary signature so that it becomes publicly verif...

Journal: :IACR Cryptology ePrint Archive 2006
Phani Kumar Kancharla Shailaja Gummadidala Ashutosh Saxena

Identity based cryptosystem simplifies the key management and revocation problem. Here we propose an Identity Based Strong Designated Verifier Signature (IBSDVS) scheme using bilinear pairings. The Designated Verifier Signature scheme described in [10] is identity based but it suffers from the deligatability as pointed out in [4]. We analyse the security of the scheme and show that the problem ...

Journal: :IACR Cryptology ePrint Archive 2017
Parvin Rastegari Mehdi Berenjkoub

In a designated verifier signature (DVS) scheme a signer creates a signature which is only verifiable by a designated verifier. A DVS is a useful scheme for authenticating a signer without disturbing her privacy. In a universal DVS (UDVS) scheme, everyone who holds Alice’s traditional signature on a message (the signature holder), is able to transform it to a DVS for a specific verifier. Non-de...

Journal: :IACR Cryptology ePrint Archive 2011
Bin Wang Qing Zhao

random oracles Bin Wang and Qing Zhao Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Server-aided verification(SAV) signature is useful for power-constrained devices since a powerful server can assist in performing costly operations such as pairing operations. Wu et al. [13] defined t...

2004
Ming-Luen Wu Yuh-Dauh Lyuu

Computer networks bring tremendous progress to the information-based society. Companies, organizations, and governments have been using computers and networks to process or transmit digital data. But this also results in many different types of security requirements for group-oriented cryptographic applications. In this thesis we study existing cryptographic tools and then use them to design mo...

Journal: :IACR Cryptology ePrint Archive 2003
Ron Steinfeld Laurence Bull Huaxiong Wang Josef Pieprzyk

Motivated by privacy issues associated with dissemination of signed digital certificates, we definea new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVSscheme can function as a standard publicly-verifiable digital signature but has additional functional-ity which allows any holder of a signature (not necessarily the signer) to designate the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید