Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1074-2
Abstract: In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A’s signature into another user B’s signature on the same message m. This has numerous application, such as simplifying the certificate…
read more here.
Keywords:
signature scheme;
universally composable;
security;
scheme ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-020-04478-1
Abstract: Quantum walks have been widely used in quantum computing and quantum simulation, and can be applied for quantum teleportation. In this paper, a quantum blind signature scheme with quantum walk-based teleportation is proposed. The sender…
read more here.
Keywords:
quantum walk;
quantum;
quantum blind;
signature scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6725-7
Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing…
read more here.
Keywords:
based signature;
signature scheme;
outsourced attribute;
verifiable outsourced ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Science China Information Sciences"
DOI: 10.1007/s11432-019-2670-7
Abstract: Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al. (EUROCRYPT 2019). We prove…
read more here.
Keywords:
signature scheme;
rank syndrome;
scheme;
durandal signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Ad Hoc Networks"
DOI: 10.1016/j.adhoc.2020.102074
Abstract: Abstract With the rapid popularization of Internet of Things (IoT) in various fields, the security of the IoT has been widely concerned. Security authentication technology is the foundation of the security of the IoT. Certificateless…
read more here.
Keywords:
certificateless signature;
signature scheme;
security;
internet things ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Optik"
DOI: 10.1016/j.ijleo.2018.03.048
Abstract: Abstract To solve the conflict of certification and privacy such as the electronic election, online bidding and other such network applications, a quantum signature scheme with public verifiability is converted into a designated verifier signature…
read more here.
Keywords:
signature scheme;
designated verifier;
signature;
verifier signature ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2801266
Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and…
read more here.
Keywords:
signature scheme;
attribute based;
multiple authorities;
based signature ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2898717
Abstract: A digital signature is a fundamental cryptographic primitive that is used heavily in information society for guaranteeing the authenticity of digital information. Incremental signature, introduced by Bellare, Goldreich, and Goldwasser (CRYPTO’94), is a digital signature…
read more here.
Keywords:
based incremental;
signature;
incremental signature;
lattice based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2908244
Abstract: Recently, Lin et al. proposed a new primitive identity-based (IB) homomorphic signature scheme and presented an ingenious implement by using any IB-signature scheme as a building block. In this paper, we consider a new type…
read more here.
Keywords:
scheme;
security;
homomorphic signature;
signature scheme ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2938682
Abstract: Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic. In this…
read more here.
Keywords:
supersingular elliptic;
scheme;
elliptic curve;
signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2964686
Abstract: A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some…
read more here.
Keywords:
group signature;
signature;
group;
signature scheme ... See more keywords