Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 31-40 of 48 total results
Pairing Free Identity-Based Blind Signature Scheme with ...
Zhao et al. [19] proposed a new identity based blind signature scheme from bilinear pairings. In 2008, Kalkan et al. [20] presented a generalized ID-based blind signature from bilinear pairings. In 2010, Rao et al. [21] proposed a blind signature scheme using bilinear pairings over elliptic curves. The...
 ID-Based Blind Signature and Ring Signature from Pairings
ID-Based Blind Signature and Ring Signature from Pairings FangguoZhangandKwangjoKim InternationalResearchcenterforInformationSecurity(IRIS ...
ID-based Ring Signature and Proxy Ring Signature Schemes ...
The first ring signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their scheme is also based on the general certificate-based public key setting too. In 2002, Zhang and Kim proposed a new ID-based ring signature scheme using pairings. Later Lin and Wu proposed a more efficient ID-based ring signature scheme....
 Intro to Bilinear Maps - MIT CSAIL
Intro to Bilinear Maps Introduction Definitions Definition of a Bilinear Map Let G 1, G 2, and G t be cyclic groups of the same order. Definition A bilinear map from G 1 ×G 2 to G t is a function e : G 1 ×G 2 →G t such that for all u ∈G 1, v ∈G 2, a,b ∈Z, e(ua,vb) = e(u,v)ab. Bilinear maps are called pairings because they associate pairs...
An efficient certificateless blind signature scheme ...
An efficient certificateless blind signature scheme without bilinear pairing. ... (ID-based PKC). To satisfy requirements of different applications, many certificateless blind signature (CLBS) schemes using bilinear pairing for the CLPKC setting have been proposed. However, the bilinear pairing operation is very complicated....
 An E cient Signature Scheme from Bilinear Pairings and Its ...
Keywords: Short signature, Bilinear pairings, ID-based cryptography, Ring signature, Proxy signature 1 Introduction In recent years, bilinear pairings have found various applications in cryptography and have allowed us to construct some new cryptographic schemes [5{8,11,20, 23,27]. BLS scheme is a signature scheme that uses bilinear pairings ......
ID-based Weak Blind Signature From Bilinear Pairings - CORE
In this paper, by using the bilinear pairings, a new ID-based weak blind signature was proposed, which is based on the Discrete Logarithm Problem and Gap Diffie-Hellman Problem. The proposed scheme use ID-based public key instead of public key of digital certification, can effectively simplify the procedure of public key management and reduce ......
https://core.ac.uk/display/27852799
Average Rating (0 votes)
A new ID-based proxy blind signature scheme, Wuhan ...
An identity-based proxy blind signature scheme from bilinear pairings is introduced, which combines the advantages of proxy signature and blind signature. Further more, our scheme can prevent the original signer from generating the proxy blind signature, thus the profits of the proxy signer are guaranteed. We introduce bilinear pairings to minimize computational overhead and to improve the ......
 ID-based Ring Signature and Proxy Ring Signature Schemes ...
ID-based ring signature scheme and a proxy ring signa-ture scheme. Both the schemes are more efficient than existing one. These schemes also take care of the incon-sistencies in above two schemes. Keywords: Bilinear pairings, cryptography, digital signa-ture, ID-based, ring signature 1 Introduction The concept of ring signature was introduced ......
ID-based Threshold Blind Signature scheme from Bilinear ...
They can provide security and privacy. In this paper, We present an efficient construction from Bilin-ear pairing in an ID-based cryptography system. In an ID-based (k, n) threshold blind signature scheme, Private Key Generation Center(PKGC) distributes the secret key to n group members....
https://core.ac.uk/display/101678121
Average Rating (0 votes)
1 2 3 4 5
Pages
|