Results 221 to 230 of about 154,876 (275)
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures
Yuuki Fujita +3 more
openaire +1 more source
Targeting Cdc42 improves motor phenotype in Parkinson's disease mice and reveals age-dependent susceptibility to α-synuclein. [PDF]
Bopp V +9 more
europepmc +1 more source
Post-quantum cryptographic authentication protocol for industrial IoT using lattice-based cryptography. [PDF]
Shahid AB +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Aggregate Signature Protocol with Group Leader
Cybernetics and Systems Analysis, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kozina, G. L., Savchenko, D. K.
openaire +2 more sources
Synchronized aggregate signatures
Proceedings of the 17th ACM conference on Computer and communications security, 2010An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signature. Unfortunately, no "fully non-interactive" aggregate signature schemes are known outside of the random oracle heuristic; that is, signers must pass messages between ...
Jae Hyun Ahn +2 more
openaire +1 more source
Hybrid Aggregate Signature Scheme: A New Type Aggregate Signature Scheme
2009 Second International Conference on Information and Computing Science, 2009An aggregate signature scheme is a digital signature scheme that supports aggregation: Given n ordinary signatures on n distinct messages from n distinct ordinary signers, it is possible to aggregate all these signatures into a single short signature.
Guozheng Hu, Fan Hong, Guohua Cui
openaire +1 more source
Compact sequential aggregate signatures
Proceedings of the 2007 ACM symposium on Applied computing, 2007In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vector m=(m1, · · · mι), a public key vector PK=(PK1, · · · , PKι) and a path p=(v1, · · · , vι), where vi=(idi, PKi), the size of the third ...
Yi Mu, Willy Susilo, Huafei Zhu
openaire +1 more source
Certificateless Aggregate Signature Scheme
2010 International Conference on E-Business and E-Government, 2010This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire +1 more source

