Results 221 to 230 of about 154,876 (275)

On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures

open access: yesProceedings of the 12th ACM ASIA Public-Key Cryptography Workshop
Yuuki Fujita   +3 more
openaire   +1 more source

Targeting Cdc42 improves motor phenotype in Parkinson's disease mice and reveals age-dependent susceptibility to α-synuclein. [PDF]

open access: yesiScience
Bopp V   +9 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Aggregate Signature Protocol with Group Leader

Cybernetics and Systems Analysis, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kozina, G. L., Savchenko, D. K.
openaire   +2 more sources

Synchronized aggregate signatures

Proceedings of the 17th ACM conference on Computer and communications security, 2010
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signature. Unfortunately, no "fully non-interactive" aggregate signature schemes are known outside of the random oracle heuristic; that is, signers must pass messages between ...
Jae Hyun Ahn   +2 more
openaire   +1 more source

Hybrid Aggregate Signature Scheme: A New Type Aggregate Signature Scheme

2009 Second International Conference on Information and Computing Science, 2009
An aggregate signature scheme is a digital signature scheme that supports aggregation: Given n ordinary signatures on n distinct messages from n distinct ordinary signers, it is possible to aggregate all these signatures into a single short signature.
Guozheng Hu, Fan Hong, Guohua Cui
openaire   +1 more source

Compact sequential aggregate signatures

Proceedings of the 2007 ACM symposium on Applied computing, 2007
In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vector m=(m1, · · · mι), a public key vector PK=(PK1, · · · , PKι) and a path p=(v1, · · · , vι), where vi=(idi, PKi), the size of the third ...
Yi Mu, Willy Susilo, Huafei Zhu
openaire   +1 more source

Certificateless Aggregate Signature Scheme

2010 International Conference on E-Business and E-Government, 2010
This paper puts forward a secure construction of certificateless aggregate signature scheme using bilinear maps. The security of our scheme is based on the infeasibility of the Computational Diffie-Hellman problem and is formally proven in the strongest security model of certificateless aggregate signature schemes.
Chen Hu, Song Wangan, Zhao Bing
openaire   +1 more source

Home - About - Disclaimer - Privacy