نتایج جستجو برای: convertible limited multi verifier signature

تعداد نتایج: 931198  

Journal: :IJSN 2007
Raghav Bhaskar Javier Herranz Fabien Laguillaumie

A designated verifier signature convinces only the specific recipient of the message of its integrity and origin. Following the notion of aggregate signature introduced by Boneh et al. in [3], we introduce in this work the notion of aggregate designated verifier signature. After defining the protocols and the security model for such schemes, we give a general construction which is based on mess...

1998
Colin Boyd Ernest Foo

An exchange or payment protocol is considered fair if neither of the two parties exchanging items or payment at any time during the protocol has a signiicant advantage over the other entity. Fairness is an important property for electronic commerce. This paper identiies a design framework based on existing fair protocols which use ooine trusted third parties, but with convertible signatures as ...

Journal: :IACR Cryptology ePrint Archive 2009
B. Umaprasada Rao P. Vasudeva Reddy T. Gowri

A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signer or the designated verifier as well. Directed signatures are applicable where the signed message is sensitive to the signature receiver. Due to its merits, directed signature schemes are suitable for applications such...

Journal: :I. J. Network Security 2006
Rongxing Lu Zhenfu Cao

A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signer or the designated verifier as well. Due to its merits, the directed signature scheme can be applied on some personally or commercially sensitive occasions. Up to now, there are several directed signature schemes havi...

Journal: :IJCNDS 2014
Fuw-Yi Yang Ling-Ren Liang Chun-Chin Hsu

Designated verifier signature schemes are applied in situations such as electronic voting and electronic auctions. Signature recipients can ascertain the contents of the document, but cannot verify the identity of the signer to a third party. This study reviewed the protocols of past researches and analyzed whether these protocols would disclose signer identities under various types of attacks....

2002
Byoungcheon Lee Kwangjo Kim

As the application of digital signature is progressed in real life, the situation of using digital signatures tends to become more complex. Depending on applications a user may need to generate multiple signatures for the same message with his multiple signing keys. But the general approach of generating multiple independent signatures is not efficient. To solve this problem, we propose multi-k...

2015
Thomas Groß

Digital signature schemes are a foundational building block enabling integrity and non-repudiation. We propose a graph signature scheme and corresponding proofs that allow a prover (1) to obtain a signature on a committed graph and (2) to subsequently prove to a verifier knowledge of such a graph signature. The graph signature scheme and proofs are a building block for certification systems tha...

Journal: :IACR Cryptology ePrint Archive 2007
Dalia Khader

An Attribute Based Group Signature (ABGS) allows a verifier to request a signature from a member of a group who possesses certain attributes. Therefore, a signature should authenticate a person in a group and prove ownership of certain properties. The major difference between our scheme and previous group signatures, is that the verifier can determine the role of the actual signer within the gr...

Journal: :IACR Cryptology ePrint Archive 2012
Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh

In this study, a novel strong designated verifier signature scheme based on bilinear pairings with provable security in the standard model is proposed, while the existing ones are secure in the random oracle model. In 2007 and 2011, two strong designated verifier signature schemes in the standard model are proposed by Huang et al. and Zhang et al., respectively; in the former, the property of p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید