Results 221 to 230 of about 278,857 (261)
Some of the next articles are maybe not open access.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
In many applications of group signatures, not only a signer's identity but also which group the signer belongs to is sensitive information regarding signer privacy. In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing ...
openaire +1 more source
In many applications of group signatures, not only a signer's identity but also which group the signer belongs to is sensitive information regarding signer privacy. In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing ...
openaire +1 more source
2005
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the signers as leaves. When opening a signature a group manager only learns to which of its subtrees, if any, the signer belongs.
Mårten Trolin, Douglas Wikström
openaire +1 more source
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the signers as leaves. When opening a signature a group manager only learns to which of its subtrees, if any, the signer belongs.
Mårten Trolin, Douglas Wikström
openaire +1 more source
Computing, 2009
The authors design a new kind of signature which is the title of the paper. In this scheme the signer is the only person who may prove that they were not the signer. This reverses the usual situation. Their scheme allows more convenient personal data protection rules, given that the signer is not revealed, so their is no requirement to protect this ...
Klonowski, Marek +3 more
openaire +1 more source
The authors design a new kind of signature which is the title of the paper. In this scheme the signer is the only person who may prove that they were not the signer. This reverses the usual situation. Their scheme allows more convenient personal data protection rules, given that the signer is not revealed, so their is no requirement to protect this ...
Klonowski, Marek +3 more
openaire +1 more source
Certificateless group inside signature
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005., 2005In distributed networks, the signer wants his signature to be verified by anyone in the same group with him and the recipient wants to verify the signature independently. Motivated by this consideration, a certificateless group inside signature is presented in this paper.
null Chunbo Ma +2 more
openaire +1 more source
Generalized group signature scheme
Wuhan University Journal of Natural Sciences, 2001The concept of generalized group signature scheme will be present. Based on the generalized secret sharing scheme proposed by Lin and Harn, a non-interactive approach is designed for realizing such generalized group signature scheme. Using the new scheme, the authorized subsets of the group in which the group member can cooperate to produce the valid ...
Li Zi-chen, Wu Xu-dong, Dai Yi-qi
openaire +1 more source
Quantum threshold group signature
Science in China Series G: Physics, Mechanics and Astronomy, 2008In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem.
YuGuang Yang, QiaoYan Wen
openaire +1 more source
Study of the amidase signature group
Biochimica et Biophysica Acta (BBA) - Protein Structure and Molecular Enzymology, 1996Computer methods for database search, multiple alignment and cluster analysis indicated significant homology between amino-acid sequences of 21 amidases or amidohydrolases (EC 3.5). All of them were found to be involved in the reduction of organic nitrogen compounds and ammonia production.
Chebrou, H. +3 more
openaire +3 more sources
Group Signature Formulas Constructed from Graphs
Algebra and Logic, 2022Let \(\Gamma=(X,E)\) be a finite undirected graph without loops and let \(\mathfrak{M}\) be a variety of groups. The author defines the partially commutative group \(F(\Gamma; \mathfrak{M})\) in \(\mathfrak{M}\) as \[ F(\Gamma; \mathfrak{M})=\big \langle X \; \big | \; x_{i}x_{j}=x_{j}x_{i} \text{ if } \{x_{i},x_{j}\} \in E \big \rangle \in \mathfrak{M}
openaire +2 more sources
Group theoretic signature analysis
IEEE Transactions on Computers, 1990A new class of data-compression techniques called group-theoretic signature analysis (GTSA) for testing a logic network is proposed, and the fault coverage of the method is analyzed. This method is a generalization of accumulator compression testing. Built-in-self-test for processor environments is feasible with GTSA. >
openaire +1 more source
Verifiably Encrypted Group Signatures
2017Recently, verifiably encrypted signatures (VESs) have been widely used in fair exchange, however most of them do not provide a method to protect the anonymity of the signer, leading to privacy leakage in fair exchange. Verifiably Encrypted Group Signature (VEGS) overcomes drawbacks of VES, which allows a verifier to check its validity without ...
Zhen Wang, Xiling Luo, Qianhong Wu
openaire +1 more source

