نتایج جستجو برای: blind digital signature
تعداد نتایج: 446899 فیلتر نتایج به سال:
Electronic commerce (e-commerce) is a relatively new, emerging and constantly changing area of business management and information technology. One of the technological innovations in banking, finance and e-commerce is the electronic cash (e-cash) transfer system. E-cash transfer systems refers to the technological breakthrough that enables us to perform financial transactions electronically. In...
Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...
Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be transcoded by intermediate proxies. In this paper, we propose a multi-source stream authentication (mSSA) framework based on MPEG4 stream format. We describe the overall authentication architec...
In this study, the authors propose new aggregate signature schemes with pairing-based cryptography that can describe the pair-connected structure of signers and examples of new content approval systems with these schemes. Existing structured signature schemes are based on multisignature schemes, which are adapted for verification of a structure if all signers sign the same document. However, if...
In a ðt; nÞ threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but ðtÿ 1Þ or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the di...
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designat...
By ”secure”, we mean that some well-defined computational assumption can be shown to be sufficient for the scheme not to be existentially forgeable, even under an adaptive chosen message attack. Most, if not all, signature schemes used in practice are based on a computational assumption that is certainly necessary for this kind of security, not known to be sufficient. Since the work of Goldwass...
Fail-stop signature (FSS) schemes protect a signer against a forger with unlimited computational power by enabling the signer to provide a proof of forgery, if it occurs. A decade after its invention, there have been several FSS schemes proposed in the literature. Nonetheless, the notion of short FSS scheme has not been addressed yet. Furthermore, the short size in signature schemes has been do...
This paper focus on two security services for internet applications: authorization and anonymity. Traditional authorization solutions are not very helpful for many of the Internet applications; however, attribute certificates proposed by ITU-T seems to be well suited and provide adequate solution. On the other hand, special attention is paid to the fact that many of the operations and transacti...
As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید