Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 31-40 of 50 total results
 ID-based Ring Signature and Proxy Ring Signature Schemes ...
ID-based ring signature scheme and a proxy ring signa-ture scheme. Both the schemes are more efficient than existing one. These schemes also take care of the incon-sistencies in above two schemes. Keywords: Bilinear pairings, cryptography, digital signa-ture, ID-based, ring signature 1 Introduction The concept of ring signature was introduced ......
 ID-based Ring Signature and Proxy Ring Signature Schemes ...
In 1984, Shamir [14] introduced ID-based encryption and signature schemes to simplify key management procedures in certi cate-based public key setting. Re-cently, many bilinear pairings based ID-based signature schemes were developed. [1{7,16,17] In this paper we propose a new ID-based ring signature scheme and also an ID-...
https://eprint.iacr.org/2004/184.pdf
Average Rating (0 votes)
A Directed Threshold Signature Scheme | SpringerLink
Directed signature is a solution of such problems when signed information is sensitive to message holder/signature receiver. Generally, in a directed signature, the signer is a single entity. But, when a sensitive message is signed by an organization and needs the approval of more than one entity, threshold signature scheme is a solution of ......
A short ID-based proxy signature scheme
A short ID-based proxy signature scheme Maryam Rjabzadeh Asaar Sharif University of Technology, asaar@ee.sharif.edu ... identity-based proxy signature schemes based on the bilinear pairings [18{25], designated veri er signature ... {28], (identity-based) multi-proxy signatures [23,29{33], identity-based proxy multi-signatures...
 An efficient and secure ID-based multi-proxy multi ...
Asaar et al., in 2014 proposed an ID-based multi-proxy multi-signature (IMPMS) scheme without bilinear pairings [37]. Besides, they showed that the scheme proposed in [20] and [34] are not secure in the underlying security models. However, the scheme
https://eprint.iacr.org/2019/1031.pdf
Average Rating (0 votes)
A Security and Privacy Preserving E-Prescription System ...
In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros’s system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to ...
Efficient Unrestricted Identity-Based Aggregate Signature ...
3.2.1 Definition of identity-based signature aggregate signature schemes . An IBAS scheme involves a PKG, an aggregating multiset of n users and an aggregate signature generator. It allows the generator to compress any n individual signatures along with a multiset of n message-identity pairs, which include on the same message from the same signer, into a single signature....
Bilinear-pairings based designated-verifier multi-proxy ...
Bilinear-pairings based designated-verifier multi-proxy multi-signature scheme ... Based on Cha and Cheon's ID-based signature scheme, a multi-proxy multi-signature scheme based on bilinear-pairs is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability ......
Identity-Based Multi-Proxy Signature Scheme in the ...
Multi-proxy signature is a variant of proxy signature, which allows that a delegator (original signer) may delegate his signing rights to many proxy signers. Comparing with proxy
 A provably secure identity-based strong designated ...
tity-based directed proxy signature scheme using bilinear pair-ings and the concept of Hess’s identity-based signature scheme (Hess, 2002). In 2012, Islam and Biswas (2012a) proposed an efficient ID-based Short DVPS (ID-ShDVPS) scheme using elliptic curve bilinear pairing, which is a short signature...
1 2 3 4 5
Pages
|