Articles with "signature scheme" as a keyword



Photo by scottwebb from unsplash

Universally composable secure proxy re-signature scheme with effective calculation

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1074-2

Abstract: In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A’s signature into another user B’s signature on the same message m. This has numerous application, such as simplifying the certificate… read more here.

Keywords: signature scheme; universally composable; security; scheme ... See more keywords
Photo from wikipedia

Quantum Blind Signature Scheme Based on Quantum Walk

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-020-04478-1

Abstract: Quantum walks have been widely used in quantum computing and quantum simulation, and can be applied for quantum teleportation. In this paper, a quantum blind signature scheme with quantum walk-based teleportation is proposed. The sender… read more here.

Keywords: quantum walk; quantum; quantum blind; signature scheme ... See more keywords
Photo by kellysikkema from unsplash

Comments on “verifiable outsourced attribute-based signature scheme”

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6725-7

Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing… read more here.

Keywords: based signature; signature scheme; outsourced attribute; verifiable outsourced ... See more keywords
Photo from wikipedia

An improved Durandal signature scheme

Sign Up to like & get
recommendations!
Published in 2020 at "Science China Information Sciences"

DOI: 10.1007/s11432-019-2670-7

Abstract: Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al. (EUROCRYPT 2019). We prove… read more here.

Keywords: signature scheme; rank syndrome; scheme; durandal signature ... See more keywords
Photo by scottwebb from unsplash

A new provably secure certificateless signature scheme for Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2020.102074

Abstract: Abstract With the rapid popularization of Internet of Things (IoT) in various fields, the security of the IoT has been widely concerned. Security authentication technology is the foundation of the security of the IoT. Certificateless… read more here.

Keywords: certificateless signature; signature scheme; security; internet things ... See more keywords

A scheme on converting quantum signature with public verifiability into quantum designated verifier signature

Sign Up to like & get
recommendations!
Published in 2018 at "Optik"

DOI: 10.1016/j.ijleo.2018.03.048

Abstract: Abstract To solve the conflict of certification and privacy such as the electronic election, online bidding and other such network applications, a quantum signature scheme with public verifiability is converted into a designated verifier signature… read more here.

Keywords: signature scheme; designated verifier; signature; verifier signature ... See more keywords
Photo by kellysikkema from unsplash

Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2801266

Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and… read more here.

Keywords: signature scheme; attribute based; multiple authorities; based signature ... See more keywords
Photo from wikipedia

A Lattice-Based Incremental Signature Scheme

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2898717

Abstract: A digital signature is a fundamental cryptographic primitive that is used heavily in information society for guaranteeing the authenticity of digital information. Incremental signature, introduced by Bellare, Goldreich, and Goldwasser (CRYPTO’94), is a digital signature… read more here.

Keywords: based incremental; signature; incremental signature; lattice based ... See more keywords
Photo by scottwebb from unsplash

RKA Security of Identity-Based Homomorphic Signature Scheme

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2908244

Abstract: Recently, Lin et al. proposed a new primitive identity-based (IB) homomorphic signature scheme and presented an ingenious implement by using any IB-signature scheme as a building block. In this paper, we consider a new type… read more here.

Keywords: scheme; security; homomorphic signature; signature scheme ... See more keywords
Photo by nathananderson from unsplash

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2938682

Abstract: Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic. In this… read more here.

Keywords: supersingular elliptic; scheme; elliptic curve; signature ... See more keywords

A New Constant-Size Group Signature Scheme From Lattices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2964686

Abstract: A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some… read more here.

Keywords: group signature; signature; group; signature scheme ... See more keywords