Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 41-48 of 48 total results
 A New Certificateless Blind Signature Scheme
A New Certificateless Blind Signature Scheme Sangeetha, Akash, Pandu Verify IDBS: This algorithm takes the master public key (MPK), system parameters (params), signer’s public key (PK A) and a message/signature pair (m;s) as inputs and it outputs either valid or in- valid. The output is valid if the signature is valid with respect to master public key (MPK), the...
isyou.info/jowua/papers/jowua-v5n1-6.pdf
Average Rating (0 votes)
An ID-Based Signature Scheme from Bilinear Pairing Based ...
In an ID-Based cryptosystem, identity of users are used to generate their public and private keys. In this system private key is generated by trusted private key generator (PKG). Unlike traditional PKI, this system enables the user to use public keys without exchanging public key certificates. With the exploitation of bilinear pairing, several secure and efficient ID-Based signature schemes ......
Boneh–Lynn–Shacham - Wikipedia
In cryptography, the Boneh–Lynn–Shacham (BLS) [not verified in body] signature scheme allows a user to verify that a signer is authentic.The scheme uses a bilinear pairing for verification, and signatures are elements of an elliptic curve group. Working in an elliptic curve group provides some defense against index calculus attacks (with the caveat that such attacks are still possible in ......
A Secure ID-based Proxy Signature Scheme from Bilinear ...
Home Archives Volume 124 Number 9 A Secure ID-based Proxy Signature Scheme from Bilinear Pairings Call for Paper - July 2020 Edition IJCA solicits original research papers for the July 2020 Edition.
One-Round ID-Based Threshold Signature Scheme from ...
In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than the master key of PKG is shared....
 New and E cient ID-based Signature Scheme with Message ...
New and E cient ID-based Signature Scheme with Message Recovery using Bilinear Pairings over Elliptic Curves Salome James1, N.B.Gayathri2, P. Vasudeva Reddy3 Department of Engineering Mathematics, Andhra University, Visakhapatnam, INDIA. Email:Corresponding Author: vasucrypto@andhrauniversity.edu.in. July 14, 2018 Abstract
‪Fangguo Zhang‬ - ‪Google Scholar‬
A New ID-based Group Signature Scheme from Bilinear Pairings. X Chen, F Zhang, K Kim. IACR Cryptol. ePrint Arch. 2003, 116, 2003. 177: 2003: Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. F Zhang, R Safavi-Naini, W Susilo. International Conference on Cryptology in India, 191-204, 2003. 175:...
Efficient Unrestricted Identity-Based Aggregate Signature ...
3.2.1 Definition of identity-based signature aggregate signature schemes . An IBAS scheme involves a PKG, an aggregating multiset of n users and an aggregate signature generator. It allows the generator to compress any n individual signatures along with a multiset of n message-identity pairs, which include on the same message from the same signer, into a single signature....
1 2 3 4 5
Pages
|