نتایج جستجو برای: universal designated multi verifier signature

تعداد نتایج: 660085  

Journal: :Electronics 2021

In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality their bids decentralized, transparent, secure, auditable manner. However, parties would prefer not to disclose interests competitors, remain anonymous during auctions. this paper, we firstly an...

Journal: :IEEE Access 2022

The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which usually be divided into public verification and private verification. verifier any cloud user, while only owner. However, in most practical situations, owner expects that a specific perform tasks cannot gain knowledge about data. Yan <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

Journal: :IACR Cryptology ePrint Archive 2007
Sherman S. M. Chow Wun-She Yap

Ring signature scheme is a cryptographic construct that enables a signer to sign on behalf of a group of n different people such that the verifier can only ensure someone in the group signed, but not exactly whom. Ring signatures are utilized in many security applications. It is tricky to deploy multi-user cryptographic construct due to the complexity involved by certificates. Specifically, rin...

2013
Xiangfu Zou Daowen Qiu Paulo Mateus

Very recently, an arbitrated quantum signature (AQS) scheme of classical message with an untrusted arbitrator was presented[Eur. Phys. J. D 61(3), 773 (2011)]. In this paper, the security of the AQS scheme with an untrusted arbitrator is analyzed. An AQS scheme with an untrusted arbitrator should satisfy the unforgeable property and undeniable property. In particular, the malicious verifier can...

2017
Noor Basha

Data Aggregation is an important topic and a suitable technique in reducing the energy consumption of sensors nodes in wireless sensor networks (WSN’s) for affording secure and efficient big data aggregation. The wireless sensor networks have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as dat...

2006
Craig Gentry Zulfikar Ramzan

An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer Si signed message Mi, where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is compactness. However, while the aggregate signature itself may be compact, aggregate signature verification might require potentially lengthy additional information...

Journal: :IACR Cryptology ePrint Archive 2017
Alexandros Zacharakis Panagiotis Grontas Aris Pagourtzis

We propose a novel cryptographic primitive called conditional blind signatures. Our primitive allows a user to request blind signatures on messages of her choice. The signer has a secret Boolean input which determines if the supplied signature is valid or not. The user should not be able to distinguish between valid and invalid signatures. A designated verifier, however, can tell which signatur...

2016
S. SUSHMITHA V. DEVI

Affirmative secure and efficient big data amalgamate methods is very attractive in the field of wireless sensor networks research. In real settings, the wireless sensor networks have been broadly applied, such as target tracking and environment remote oversight. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mai...

2001
Hongjun Wu Feng Bao Robert H. Deng

At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete logarithm problem is hard to solve. Two schemes (the ID-type and the random-type schemes) based on the linear scheme for the Key Predistribution Systems (KPS) and the discrete logarithm problem (DLP) were given. In this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید