Results 221 to 230 of about 85,247 (258)
Some of the next articles are maybe not open access.

Signtiming scheme based on aggregate signature

2008 IEEE International Conference on Intelligence and Security Informatics, 2008
Timestamping is a cryptographic technique providing us with a proof-of-existence of a digital document at a given time. Combining both digital signature and provable time-stamping guarantees authentication, integrity and non-repudiation of electronic documents. In this paper, we introduce such a service, so called signtiming.
Duc-Phong Le   +2 more
openaire   +1 more source

Certificateless Ordered Sequential Aggregate Signature Scheme

2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011
Ordered sequential aggregate signature scheme is a signature scheme in which each signer for a group signs an individual document, and guarantees both of the validity of the document and the signing order. Many ordered sequential aggregate signature schemes are ID-based scheme and inherit an intrinsic insider problem, called key escrow problem, of the ...
Naoto Yanai   +3 more
openaire   +1 more source

An efficient certificateless aggregate signature scheme

Wuhan University Journal of Natural Sciences, 2017
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire   +1 more source

Three attacks of certificateless aggregate signature scheme

Proceedings of the ACM Turing Celebration Conference - China, 2019
After in-depth research, this paper finds that there are three types of attacks in the existing certificateless aggregate signature scheme. For these three types of attacks, this paper gives detailed attack steps for specific schemes, analyzes the reasons for the existing attacks and proposes improvement measures. This paper provides ideas for the next
Shi Lin, Fu Pu, Li Cui
openaire   +1 more source

Security Model for Certificateless Aggregate Signature Schemes

2008 International Conference on Computational Intelligence and Security, 2008
Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one.
Lei Zhang, Futai Zhang
openaire   +1 more source

Comparing two pairing-based aggregate signature schemes

Designs, Codes and Cryptography, 2009
This paper describes detailed security and performance comparisons of two aggregate signature schemes. The first (BGLS), due to \textit{D. Boneh, C. Gentry, B. Lynn} and \textit{H. Shacham} [Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553)], uses bilinear pairings and has a reductionist security proof assuming the random ...
Chatterjee, Sanjit   +3 more
openaire   +1 more source

A Sanitizable Signature Scheme with Aggregation

2007
A sanitizable signature scheme is a digital signature scheme in which, after generating a signer's signature on a document, specific entities (called sanitizers) can modify the document for hiding partial information. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. The sanitizable signature is quite
Tetsuya Izu   +4 more
openaire   +1 more source

Aggregate Signature Consensus Scheme Based on FPGA

2019
With the rapid development of cryptocurrency, such as the Bitcoin, block chain technology, as the bottom technology of Bitcoin, has been widely concerned by researchers. Block chain has the characteristics of decentralization, anonymity and non-tampering, which realizes the transformation from social trust to machine trust.
Jinhua Fu   +5 more
openaire   +1 more source

Provably Secure Identity-Based Aggregate Signature Scheme

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length.
openaire   +1 more source

MQSAS - A Multivariate Sequential Aggregate Signature Scheme

2016
(Sequential) Aggregate signature schemes enable a group of users \(u_1, \dots , u_k\) with messages \(m_1, \dots , m_k\) to produce a single signature \(\varSigma \) which states the integrity and authenticity of all the messages \(m_1, \dots , m_k\).
El Bansarkhani, Rachid   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy