نتایج جستجو برای: unforgeability of ticket

تعداد نتایج: 21164284  

Journal: :Ellipsis 2023

1999
Levente Buttyán Jean-Pierre Hubaux

We introduce a model that allows anonymous yet accountable access to services in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We introduce the general idea of ticket based service access, and present a categorisation of ticket types and ticket acquisition models. We...

2010
Bo Zhang Qiuliang Xu

Anonymous signcryption is a novel cryptographic primitive motivated from ring signature. It is an important method to realize the signcrypter identities' ambiguity. In this paper, we propose an identity-based anonymous signcryption scheme for multiple receivers in the standard model. The proposed scheme satisfies the semantic security, unforgeability and signcrypter identity's ambiguity. We als...

2013
Yan Xu Miaomiao Tian Liusheng Huang Wei Yang Xiaochen Shen X. C. Shen

Recently, Boyen at PKC 2010 proposed a lattice-based signature scheme in the standard model. In this paper, we show that his signature scheme does not satisfy strong unforgeability. In other words, an adversary can produce a new signature for a message M after seeing a signature of the message M. Then we present an improved scheme and prove that the improved scheme satisfies strong unforgeabili...

Journal: :IACR Cryptology ePrint Archive 2012
S. Sree Vivek S. Sharmila Deva Selvi Guhan Balasubramanian C. Pandu Rangan

Proxy re-signatures are generally used for the delegation of signatures to a semi-trusted proxy which transforms the signatures between the users of the system. Its a handy primitive for network security and automated delegations in hierarchical organizations. Though proxy re-signature schemes that are secure in the standard model are available, none of them have addressed the security notion o...

2017
Stephen L. Shapiro Joris Drayer Brendan Dwyer

Dynamic ticket pricing (DTP), a new revenue management (RM) strategy in sport, has grown in popularity in response to the demand-based ticket resale market. Previous research has examined the relationship between the primary and secondary ticket market and determinants of price in a DTP environment. However, research has not focused on consumer perceptions of DTP or resale prices. The purpose o...

2003
Nol Premasathian Somying Thainimit

This paper proposes a concept of how to collect toll on highways. Unlike any existing method, the proposed approach requires no structure to be built on highways for the toll collection purpose and drivers are not required to stop or even slow down to pay toll. Toll must be prepaid in advance and a driver must keep a toll ticket as proof of payment. We apply public key cryptographic operations ...

1996
Hideyuki TOKUDA

In an interactive multimedia environment that handles multiple sessions dynamically, a mechanism for controlling the QOS among sessions is very important. It is, however, di cult to achieve such QOS control without any system support. A new resourcemanagement mechanism and QOS-control architecture for multimedia applications are needed. This paper rst discusses features required for such archit...

Journal: :IACR Cryptology ePrint Archive 2013
Carlos Aguilar Melchor Slim Bettaieb Xavier Boyen Laurent Fousse Philippe Gaborit

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-andsign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signatur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید