Results 211 to 220 of about 30,753 (229)
Some of the next articles are maybe not open access.
Efficient designated confirmer signature from bilinear pairings
Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008Designated confirmer signature is an important cryptographic primitive, it is widely used in E-commerce. In this paper, we propose a new designated confirmer signature scheme which is transformed from a new signature scheme. The proposed scheme has very simple construction and is much more efficient than the previous ones and does not need any ...
Fangguo Zhang +2 more
openaire +1 more source
Certificateless Short Signature Scheme from Bilinear Pairings
Applied Mechanics and Materials, 2013Certificateless short signature schemes can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However, all existing certificateless short signature schemes only proven secure against a normal adversary which can only obtain the valid signature for the original public key rather than a ...
Shu Rong Feng +3 more
openaire +1 more source
Group key agreement from bilinear pairings
2013The use of bilinear pairings as a building block for cryptographic protocols, most notably in the construction of identity-based cryptosystems, is a very popular area of cryptographic research. In this thesis, we provide a novel classification of pairing-based group key agreement (GKA) from current literature.
openaire +2 more sources
Improved Proxy Signature Scheme without Bilinear Pairings
2013Proxy signature is an active research area in cryptography. In order to save the running time and the size of the signature, recently a provable secure proxy signature scheme without bilinear pairings has been proposed which is based on elliptic curve discrete log problem (ECDLP).
Sahadeo Padhye, Namita Tiwari
openaire +1 more source
ID-Based Proxy Signature Using Bilinear Pairings
2005Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity.
Jing Xu, Zhenfeng Zhang, Dengguo Feng
openaire +1 more source
A biometric signcryption scheme without bilinear pairing
SPIE Proceedings, 2013How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis’s fuzzy extractor method and Liu’s original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper.
Mingwen Wang +3 more
openaire +1 more source
A Bilinear Pairing Based Hidden-Signature Scheme
2010In this paper we propose a bilinear pairing based hidden blind signature scheme. The proposed scheme allows the signer to append information to the hidden signed message. The requester cannot modify neither this information nor the signed message.
Mohamed Rasslan, Amr Youssef
openaire +1 more source
Short Traceable Signatures Based on Bilinear Pairings
2006We propose a short traceable signature scheme based on bilinear pairings. Traceable signatures, introduced by Kiayias, Tsiounis and Yung (KTY), support an extended set of fairness mechanisms (mechanisms for anonymity management and revocation) when compared with the traditional group signatures.
Seung Geol Choi, Kunsoo Park, Moti Yung
openaire +1 more source
ID-Based Aggregate Signatures from Bilinear Pairings
2005Aggregate signature scheme was recently proposed by Boneh, Gentry, Lynn and Shacham, which presented a method for combining n signatures from n different signers on n different messages into one signature. In this paper, we propose an identity-based aggregate signature scheme based on the bilinear pairings. This enhances the efficiency of communication
Jing Xu, Zhenfeng Zhang, Dengguo Feng
openaire +1 more source
Proxy Structured Multisignature Scheme from Bilinear Pairings
2004In the past few years, proxy signatures have become an important research area and many excellent schemes have been proposed. Proxy signatures can combine other special signatures to obtain some new types of proxy signatures. A multisignature scheme is said to be structured if the group of signers is structured.
Xiangxue Li +3 more
openaire +1 more source

