Results 231 to 240 of about 5,821 (279)
Some of the next articles are maybe not open access.
Hybrid Aggregate Signature Scheme: A New Type Aggregate Signature Scheme
2009 Second International Conference on Information and Computing Science, 2009An aggregate signature scheme is a digital signature scheme that supports aggregation: Given n ordinary signatures on n distinct messages from n distinct ordinary signers, it is possible to aggregate all these signatures into a single short signature.
Guozheng Hu, Fan Hong, Guohua Cui
openaire +1 more source
Certificateless Aggregate Signature Scheme
2010 International Conference on E-Business and E-Government, 2010This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire +1 more source
A structured aggregate signature scheme
2010 International Symposium On Information Theory & Its Applications, 2010In multisignature scheme, verifiying the signing order is sometimes very important. A multisignature scheme in which generated signatures reflect the structure of signers, e.g. signing order, is called structured multisignature scheme and many such schemes have been proposed so far.
Naoto Yanai, Eikoh Chida, Masahiro Mambo
openaire +1 more source
A new certificateless aggregate signature scheme
Computer Communications, 2009Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes.
Lei Zhang, Futai Zhang
openaire +1 more source
Some aggregate forward-secure signature schemes
TENCON 2008 - 2008 IEEE Region 10 Conference, 2008Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked.
N.R. Sunitha, B.B. Amberker
openaire +1 more source
Certificateless aggregate signature schemes: A review
2016 International Conference on Computing, Communication and Automation (ICCCA), 2016In the last decades security become a major issue due to increase technology. Among all the existing scheme certificateless aggregate schemes are very efficient techniques in recent scenario which is very helpful to provide security. Certificateless aggregate schemes are most attractive topic for researchers to give a lot of potential to secure our ...
Pankaj Kumar +2 more
openaire +1 more source
Signtiming scheme based on aggregate signature
2008 IEEE International Conference on Intelligence and Security Informatics, 2008Timestamping is a cryptographic technique providing us with a proof-of-existence of a digital document at a given time. Combining both digital signature and provable time-stamping guarantees authentication, integrity and non-repudiation of electronic documents. In this paper, we introduce such a service, so called signtiming.
Duc-Phong Le +2 more
openaire +1 more source
Certificateless Ordered Sequential Aggregate Signature Scheme
2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011Ordered sequential aggregate signature scheme is a signature scheme in which each signer for a group signs an individual document, and guarantees both of the validity of the document and the signing order. Many ordered sequential aggregate signature schemes are ID-based scheme and inherit an intrinsic insider problem, called key escrow problem, of the ...
Naoto Yanai +3 more
openaire +1 more source
An efficient certificateless aggregate signature scheme
Wuhan University Journal of Natural Sciences, 2017Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its ...
Baoyuan Kang, Mu Wang, Dongya Jing
openaire +1 more source
Three attacks of certificateless aggregate signature scheme
Proceedings of the ACM Turing Celebration Conference - China, 2019After in-depth research, this paper finds that there are three types of attacks in the existing certificateless aggregate signature scheme. For these three types of attacks, this paper gives detailed attack steps for specific schemes, analyzes the reasons for the existing attacks and proposes improvement measures. This paper provides ideas for the next
Shi Lin, Fu Pu, Li Cui
openaire +1 more source

