نتایج جستجو برای: signature verification

تعداد نتایج: 138762  

Journal: :IACR Cryptology ePrint Archive 2010
Gregory M. Zaverucha Douglas R. Stinson

We present a new one-time signature scheme having short signatures. Our new scheme is also the first one-time signature scheme that supports aggregation, batch verification, and which admits efficient proofs of knowledge. It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to ECDSA verification. These properties make our scheme suitable for...

2017

The concept of the signature is wide used as a means of individual verification emphasizes the need for an automatic verification system because of the individual aspect effect of being easily misused by those who would pretend the Identification of an individual. A great deal of work has been done in the area of off-line signature verification over the past few decades. Verification can be per...

2016
Mohamed Saied Emam Mohamed Albrecht Petzoldt

Multivariate Cryptography is one of the main candidates for creating post quantum public key cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate schemes. In this paper we present a general technique to reduce the signature size of multivariate schemes. Our technique enables us to reduce the signature size of nearly all multivariate sig...

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2013

Journal: :Revista de Informática Teórica e Aplicada 2011

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2020

Journal: :International Journal of Fuzzy Logic and Intelligent Systems 2003

2004
HyoJin Yoon Jung Hee Cheon Yongdae Kim

An identity (ID)-based signature scheme allows any pair of users to verify each other’s signatures without exchanging public key certificates. With the advent of Bilinear maps, several ID-based signatures based on the discrete logarithm problem have been proposed. While these signatures have an advantage in the fact that the system secret can be shared by several parties using a threshold schem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید