Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 1-10 of 19 total results
ID-Based Directed Multi-Proxy Signature Scheme from ...
Abstract. In a multi-proxy signature scheme, an original signer delegates his signing power to a group ofproxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signatureon behalf of the original signer; and any one can verify the validity of the multi-proxy signature.But, when the signed message is sensitive to the signature receiver, it is necessary to combinethe ......
https://core.ac.uk/display/25874894
Average Rating (0 votes)
(PDF) An Efficient ID- based Directed Signature Scheme ...
An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 Article (PDF Available) · January 2009 with 67 Reads How we measure 'reads'
Identity-Based Directed Signature Scheme without Bilinear ...
Such directed signature schemes are applicable in many situations where the signed message is sensitive to the receiver such as signature on medical records, tax information etc. However all the existing directed signature schemes in ID based setting uses bilinear pairings over elliptic curves....
 Efficient and Secure Pairing-free ID-based Directed Proxy ...
A directed proxy signature scheme is a kind of signature scheme in which the verification ability is controlled by the proxy signer. Although many identity-based proxy signature schemes have been proposed in the literature, only a few identity-based directed proxy signature schemes are available. However, it has been found that all these ......
Secure proxy signature schemes from the Weil pairing
A proxy signature scheme is a method which allows an original signer to delegate his signing authority to a designated person, called a proxy signer. Up to now, most of proxy signature schemes are based on the discrete logarithm problem. In this paper, we propose a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing, and also provide a security proof....
An improved certificateless aggregate signature scheme ...
Very recently, the authors in proposed an efficient CL-AS scheme for VANET without using bilinear pairing operation. However, we show that the scheme is insecure against a signature forgery attack; and then propose new CLS and CL-AS schemes to address the security, privacy, and performance issues in VANETs.
 An Efficient ID- based Directed Signature Scheme from ...
Recently, in 2008, Xun Sun et al. [20], proposed an ID-based directed signature scheme from bilinear pairings. The scheme is based on modified SOK identity based signature scheme due to Bellare et al. [2]. Also, based on the work of Libert and Quisquarter [14], they proved that their scheme is existentially unforgeable and invisible...
https://eprint.iacr.org/2009/617.pdf
Average Rating (0 votes)
On the security of an identity based multi-proxy signature ...
An ID-based multi-proxy signature scheme should be secure against existential forgery under an adaptive-chosen-message, an adaptive-chosen-warrant, and a given-identity attack. The adversary A is given a single ID. His goal is the existential forgery of a standard ID-based signature or an ID-based multi-proxy signature....
 ID-based Directed Threshold Multisignature Scheme from ...
Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. By combining all these ideas, in this paper, we propose an ID-based Directed Threshold Multisignature Scheme from bilinear pairings. To the best of our knowledge this is the first directed threshold...
1 2
Pages
|