Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jul 14, 2017 · In this paper, we cryptanalyze an identity-based convertible undeniable signature scheme which claimed to be secure under the random oracle ...
In this paper, we cryptanalyze an identity-based convertible undeniable signature scheme which claimed to be secure under the random oracle model.
In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting ...
Based on Hess's identity-based signature scheme, Gu and Zhu proposed an identity-based verifiably encrypted signature scheme in CISC 2005.
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based ...
Missing: Cryptanalysis | Show results with:Cryptanalysis
It is proved that the identity based setting the security model for the notions of invisibility and anonymity given by Galbraith and Mao in 2003 is extended ...
Meanwhile, an identity-based convertible undeniable signature scheme based on ... Heng, “Cryptanalysis of an identity-based convertible undeniable signature.
We proposed an identity-based convertible undeniable signature scheme from pairings based on Han et al.'s defective scheme. Our proposed scheme is secure ...
People also ask
Our analysis shows that the anonymity property requires all signers to possess the same signature space but the invisibility property does not. This conforms to ...
Abstract. In this paper, we give a first example of identity based un- deniable signature using pairings over elliptic curves. We extend to the.
Missing: Cryptanalysis | Show results with:Cryptanalysis