Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 11-20 of 50 total results
An improved certificateless aggregate signature scheme ...
Very recently, the authors in proposed an efficient CL-AS scheme for VANET without using bilinear pairing operation. However, we show that the scheme is insecure against a signature forgery attack; and then propose new CLS and CL-AS schemes to address the security, privacy, and performance issues in VANETs.
 An Efficient ID- based Directed Signature Scheme from ...
Recently, in 2008, Xun Sun et al. [20], proposed an ID-based directed signature scheme from bilinear pairings. The scheme is based on modified SOK identity based signature scheme due to Bellare et al. [2]. Also, based on the work of Libert and Quisquarter [14], they proved that their scheme is existentially unforgeable and invisible...
https://eprint.iacr.org/2009/617.pdf
Average Rating (0 votes)
An ID-based multi-proxy multi-signature scheme
Proxy signature scheme enables the original signer to delegate his/her signing capability to a proxy signer. Bilinear pairings are useful in signature protocols for the ease of computation. In this paper, we have proposed an ID-based multi-proxy multi-signature scheme from bilinear pairing, using the schemes of Cao and Cao [2, 3] and Li and ......
ID-Based Multi-proxy Sequential Signature System from ...
An efficient identity-based signature scheme is presented which makes use of bilinear pairings on elliptic curves. This scheme is similar to the generalised ElGamal signature scheme. The security ...
 ID-Based Multi-Proxy Signature and Blind Multisignature ...
proxy signature from bilinear pairings [19]. In this paper, we propose an ID-based multi-proxy signature scheme (IDMPS) and an ID-based blind multisignature scheme (IDBMS) from bilinear pairings. Both the schemes can be regarded as a special case of corresponding variants of ID-based threshold signature scheme....
On the security of an identity based multi-proxy signature ...
An ID-based multi-proxy signature scheme should be secure against existential forgery under an adaptive-chosen-message, an adaptive-chosen-warrant, and a given-identity attack. The adversary A is given a single ID. His goal is the existential forgery of a standard ID-based signature or an ID-based multi-proxy signature....
 ID-based Directed Threshold Multisignature Scheme from ...
Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. By combining all these ideas, in this paper, we propose an ID-based Directed Threshold Multisignature Scheme from bilinear pairings. To the best of our knowledge this is the first directed threshold...
B.Umaprasada Rao & P.Vasudeva Reddy ID-Based Directed ...
But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concepts of multi-proxy signatures with directed signatures. In this paper, we propose an identity based directed multi-proxy signature scheme using bilinear pairings....
ID-Based Directed Multi-Proxy Signature Scheme from ...
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings . ... In this paper, we propose anidentity based directed multi-proxy signature scheme using bilinear pairings. This scheme allowsa group of proxy signers to generate a valid multi-proxy signature to a designated verifier. Thedesignated verifier can only directly verify the ......
https://core.ac.uk/display/27728403
Average Rating (0 votes)
1 2 3 4 5
Pages
|