Results 241 to 250 of about 5,821 (279)
Some of the next articles are maybe not open access.

Security Model for Certificateless Aggregate Signature Schemes

2008 International Conference on Computational Intelligence and Security, 2008
Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one.
Lei Zhang, Futai Zhang
openaire   +1 more source

Comparing two pairing-based aggregate signature schemes

Designs, Codes and Cryptography, 2009
This paper describes detailed security and performance comparisons of two aggregate signature schemes. The first (BGLS), due to \textit{D. Boneh, C. Gentry, B. Lynn} and \textit{H. Shacham} [Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553)], uses bilinear pairings and has a reductionist security proof assuming the random ...
Chatterjee, Sanjit   +3 more
openaire   +1 more source

Unrestricted and compact certificateless aggregate signature scheme

Information Sciences, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Keitaro Hashimoto, Wakaha Ogata
openaire   +2 more sources

A Sanitizable Signature Scheme with Aggregation

2007
A sanitizable signature scheme is a digital signature scheme in which, after generating a signer's signature on a document, specific entities (called sanitizers) can modify the document for hiding partial information. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. The sanitizable signature is quite
Tetsuya Izu   +4 more
openaire   +1 more source

Aggregate Signature Consensus Scheme Based on FPGA

2019
With the rapid development of cryptocurrency, such as the Bitcoin, block chain technology, as the bottom technology of Bitcoin, has been widely concerned by researchers. Block chain has the characteristics of decentralization, anonymity and non-tampering, which realizes the transformation from social trust to machine trust.
Jinhua Fu   +5 more
openaire   +1 more source

Provably Secure Identity-Based Aggregate Signature Scheme

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length.
openaire   +1 more source

MQSAS - A Multivariate Sequential Aggregate Signature Scheme

2016
(Sequential) Aggregate signature schemes enable a group of users \(u_1, \dots , u_k\) with messages \(m_1, \dots , m_k\) to produce a single signature \(\varSigma \) which states the integrity and authenticity of all the messages \(m_1, \dots , m_k\).
El Bansarkhani, Rachid   +2 more
openaire   +1 more source

Certificateless Sequential Aggregate Signature Scheme on NTRU Lattice

Chinese Journal of Electronics, 2019
Having the advantages of certificateless signature and the aggregate signature at the same time, certificateless aggregate signature has been widely applied in e-business, e-government and software security since it was proposed in 2007. Although a number of certificateless aggregate signature schemes have been proposed, all of them are based on the ...
Jia XIE   +3 more
openaire   +1 more source

An Aggregate Signature Scheme with Constant Pairing Operations

2008 International Conference on Computer Science and Software Engineering, 2008
We propose a new aggregate signature scheme from bilinear pairings. It requires constant pairing operations in the verification and the size of aggregate signature is independent of the number of signers. In the public key infrastructure (PKI) setting, it is the first aggregate signature scheme with these properties.
Yiling Wen, Jianfeng Ma
openaire   +1 more source

MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature

2020
Multivariate public key cryptography which relies on multivariate quadratic (MQ) problem is one of the main approaches to guarantee the security of communication in the post-quantum world. In this paper, we focus mainly on the yet unbroken (under proper parameter choice) Unbalanced Oil and Vinegar (UOV) scheme, and discuss the exact security of it ...
Jiahui Chen   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy