نتایج جستجو برای: convertible limited multi verifier signature

تعداد نتایج: 931198  

Journal: :Computers & Mathematics with Applications 2009

Journal: :Inf. Process. Lett. 2007
Fabien Laguillaumie Damien Vergnaud

In 1996, Jakobsson, Sako and Impagliazzo and, on the other hand, Chaum proposed the notion of designated verifier signature to solve some of the intrinsic problems of undeniable signatures. The generalization of this concept, suggested by Desmedt at Crypto’03’s rump session, was formally investigated by Laguillaumie and Vergnaud at ICICS’04 as multi-designated verifiers signatures. The protecti...

2007
Young Whan Lee Byung Mun Choi A. Saxena B. Soh

In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but ...

Journal: :IACR Cryptology ePrint Archive 2007
Sherman S. M. Chow Wun-She Yap

Ring signature scheme is a cryptographic construct that enables a signer to sign on behalf of a group of n different people such that the verifier can only ensure someone in the group signed, but not exactly whom. Ring signatures are utilized in many security applications. It is tricky to deploy multi-user cryptographic construct due to the complexity involved by certificates. Specifically, rin...

Journal: :Informatica, Lith. Acad. Sci. 2003
Hung-Yu Chien

An authenticated encryption allows the designated recipient to verify the authenticity while recovering the message. To protect the recipient’s benefit in case of a later dispute, a convertible authenticated encryption scheme allows the recipient to convert the authenticated encryption into an ordinary signature so that it becomes a publicly verifiable. This paper shows a universal forgery atta...

2005
Guilin Wang

In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. In this paper, we first propose a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Then, we extend this basic scheme into designated-verifier proxy signatures (DVPS). More specifically, we...

2013
Xiangfu Zou Daowen Qiu Paulo Mateus

Very recently, an arbitrated quantum signature (AQS) scheme of classical message with an untrusted arbitrator was presented[Eur. Phys. J. D 61(3), 773 (2011)]. In this paper, the security of the AQS scheme with an untrusted arbitrator is analyzed. An AQS scheme with an untrusted arbitrator should satisfy the unforgeable property and undeniable property. In particular, the malicious verifier can...

2006
Craig Gentry Zulfikar Ramzan

An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer Si signed message Mi, where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is compactness. However, while the aggregate signature itself may be compact, aggregate signature verification might require potentially lengthy additional information...

Journal: :IACR Cryptology ePrint Archive 2003
Guilin Wang

At Crypto’89, Chaum and van Antwerpen first introduced the concept of undeniable signatures, which has a special property such that a signature cannot be verified without the signer’s cooperation. In 1996, Jakobsson, Sako, and Impagliazzo proposed a not-interactive undeniable signature scheme by employing a new primitive called designated verifier proofs. However, this paper shows that their sc...

Journal: :Int. Arab J. Inf. Technol. 2014
Chien-Lung Hsu Han-Yu Lin

Based on the bilinear Diffie-Hellman assumption, in 2009, Kang et al. proposed an identity-based strong Designated Verifier Signature (DVS) scheme which only allows the intended verifier to verify the signature. Besides, the designated verifier is not capable of transferring the conviction to any third party. Their scheme was proved secure in the random oracle model. In this paper, however, we ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید