Web
Education
An improved certificateless aggregate signature scheme ...
Very recently, the authors in proposed an efficient CL-AS scheme for VANET without using bilinear pairing operation. However, we show that the scheme is insecure against a signature forgery attack; and then propose new CLS and CL-AS schemes to address the security, privacy, and performance issues in VANETs.
An Efficient ID- based Directed Signature Scheme from ...
Recently, in 2008, Xun Sun et al. [20], proposed an ID-based directed signature scheme from bilinear pairings. The scheme is based on modified SOK identity based signature scheme due to Bellare et al. [2]. Also, based on the work of Libert and Quisquarter [14], they proved that their scheme is existentially unforgeable and invisible...
An ID-based multi-proxy multi-signature scheme
Proxy signature scheme enables the original signer to delegate his/her signing capability to a proxy signer. Bilinear pairings are useful in signature protocols for the ease of computation. In this paper, we have proposed an ID-based multi-proxy multi-signature scheme from bilinear pairing, using the schemes of Cao and Cao [2, 3] and Li and ......
ID-based multi-proxy multi-signature scheme from bilinear ...
ID-based multi-proxy multi-signature scheme from bilinear pairing
ID-Based Multi-proxy Sequential Signature System from ...
An efficient identity-based signature scheme is presented which makes use of bilinear pairings on elliptic curves. This scheme is similar to the generalised ElGamal signature scheme. The security ...
ID-Based Multi-Proxy Signature and Blind Multisignature ...
proxy signature from bilinear pairings [19]. In this paper, we propose an ID-based multi-proxy signature scheme (IDMPS) and an ID-based blind multisignature scheme (IDBMS) from bilinear pairings. Both the schemes can be regarded as a special case of corresponding variants of ID-based threshold signature scheme....
On the security of an identity based multi-proxy signature ...
An ID-based multi-proxy signature scheme should be secure against existential forgery under an adaptive-chosen-message, an adaptive-chosen-warrant, and a given-identity attack. The adversary A is given a single ID. His goal is the existential forgery of a standard ID-based signature or an ID-based multi-proxy signature....
ID-based Directed Threshold Multisignature Scheme from ...
Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. By combining all these ideas, in this paper, we propose an ID-based Directed Threshold Multisignature Scheme from bilinear pairings. To the best of our knowledge this is the first directed threshold...
B.Umaprasada Rao & P.Vasudeva Reddy ID-Based Directed ...
But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concepts of multi-proxy signatures with directed signatures. In this paper, we propose an identity based directed multi-proxy signature scheme using bilinear pairings....
ID-Based Directed Multi-Proxy Signature Scheme from ...
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings . ... In this paper, we propose anidentity based directed multi-proxy signature scheme using bilinear pairings. This scheme allowsa group of proxy signers to generate a valid multi-proxy signature to a designated verifier. Thedesignated verifier can only directly verify the ......
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.