Results 241 to 250 of about 2,249,719 (290)
Some of the next articles are maybe not open access.
Withdrawable Signature: How to Call Off a Signature
2023Digital signatures are a cornerstone of security and trust in cryptography, providing authenticity, integrity, and non-repudiation. Despite their benefits, traditional digital signature schemes suffer from inherent immutability, offering no provision for a signer to retract a previously issued signature.
Xin Liu 0074 +2 more
openaire +3 more sources
Classification of signature-only signature models
Science in China Series F: Information Sciences, 2008zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhengjun Cao, Mulan Liu
openaire +1 more source
2005
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows authorized semi-trusted censors to modify – in a limited and controlled fashion – parts of a signed message without interacting with the original signer.
ATENIESE, GIUSEPPE +3 more
openaire +1 more source
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows authorized semi-trusted censors to modify – in a limited and controlled fashion – parts of a signed message without interacting with the original signer.
ATENIESE, GIUSEPPE +3 more
openaire +1 more source
Optimal distribution of signatures in signature hashing
IEEE Transactions on Knowledge and Data Engineering, 1992G.H. Gonnet and P.A. Larson (1982) proposed a hashing scheme for external files which guarantees single access retrieval. They provided an asymptotic analysis of the scheme assuming uniform distribution of the signatures. This paper addresses an open problem posed by them in a second work (J.
M. V. Ramakrishna, Edgar A. Ramos
openaire +1 more source
Signature files and signature trees
Information Processing Letters, 2002zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Research on anonymous signatures and group signatures
Computer Communications, 2008In this paper, we analyze the conventional group signature schemes, and propose the notion of conflict of authenticated contents which implies the unconquerable drawbacks of the current group signature schemes and threshold signature schemes. We discuss an important problem of group signature, that is, whether the group signature is produced on behalf ...
Fucai Zhou, Jun Zhang, Jian Xu 0004
openaire +1 more source
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, 2000This paper proves the security of a large class of signature schemes in the so-called random oracle model. This model assumes that the hash function used in a signature scheme behaves as a random function. However, it has been shown that there exist (contrived) schemes that are provably secure in the random oracle model, but not when used with a real ...
David Pointcheval, Jacques Stern
openaire +1 more source
Annals of Combinatorics, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hartke, Stephen G., Radcliffe, A. J.
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hartke, Stephen G., Radcliffe, A. J.
openaire +2 more sources

