Results 221 to 230 of about 85,247 (258)
Some of the next articles are maybe not open access.
Signtiming scheme based on aggregate signature
2008 IEEE International Conference on Intelligence and Security Informatics, 2008Timestamping is a cryptographic technique providing us with a proof-of-existence of a digital document at a given time. Combining both digital signature and provable time-stamping guarantees authentication, integrity and non-repudiation of electronic documents. In this paper, we introduce such a service, so called signtiming.
Duc-Phong Le +2 more
openaire +1 more source
Certificateless Ordered Sequential Aggregate Signature Scheme
2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011Ordered sequential aggregate signature scheme is a signature scheme in which each signer for a group signs an individual document, and guarantees both of the validity of the document and the signing order. Many ordered sequential aggregate signature schemes are ID-based scheme and inherit an intrinsic insider problem, called key escrow problem, of the ...
Naoto Yanai +3 more
openaire +1 more source
An efficient certificateless aggregate signature scheme
Wuhan University Journal of Natural Sciences, 2017Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire +1 more source
Three attacks of certificateless aggregate signature scheme
Proceedings of the ACM Turing Celebration Conference - China, 2019After in-depth research, this paper finds that there are three types of attacks in the existing certificateless aggregate signature scheme. For these three types of attacks, this paper gives detailed attack steps for specific schemes, analyzes the reasons for the existing attacks and proposes improvement measures. This paper provides ideas for the next
Shi Lin, Fu Pu, Li Cui
openaire +1 more source
Security Model for Certificateless Aggregate Signature Schemes
2008 International Conference on Computational Intelligence and Security, 2008Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one.
Lei Zhang, Futai Zhang
openaire +1 more source
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography, 2009This paper describes detailed security and performance comparisons of two aggregate signature schemes. The first (BGLS), due to \textit{D. Boneh, C. Gentry, B. Lynn} and \textit{H. Shacham} [Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553)], uses bilinear pairings and has a reductionist security proof assuming the random ...
Chatterjee, Sanjit +3 more
openaire +1 more source
A Sanitizable Signature Scheme with Aggregation
2007A sanitizable signature scheme is a digital signature scheme in which, after generating a signer's signature on a document, specific entities (called sanitizers) can modify the document for hiding partial information. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. The sanitizable signature is quite
Tetsuya Izu +4 more
openaire +1 more source
Aggregate Signature Consensus Scheme Based on FPGA
2019With the rapid development of cryptocurrency, such as the Bitcoin, block chain technology, as the bottom technology of Bitcoin, has been widely concerned by researchers. Block chain has the characteristics of decentralization, anonymity and non-tampering, which realizes the transformation from social trust to machine trust.
Jinhua Fu +5 more
openaire +1 more source
Provably Secure Identity-Based Aggregate Signature Scheme
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length.
openaire +1 more source
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
2016(Sequential) Aggregate signature schemes enable a group of users \(u_1, \dots , u_k\) with messages \(m_1, \dots , m_k\) to produce a single signature \(\varSigma \) which states the integrity and authenticity of all the messages \(m_1, \dots , m_k\).
El Bansarkhani, Rachid +2 more
openaire +1 more source

