Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   3  
      Time ComplexityRandom Oracle ModelThreshold Signature
In this paper, we propose a Directed threshold multisignature scheme without SDC. This signature scheme is applicable when the message is sensitive to the signature receiver; and the signatures are generated by the cooperation of a number... more
    • by 
    •   3  
      Digital SignatureThreshold SignatureSignature Scheme
Identity-based systems have the property that a user’s public key can be easily calculated from his identity by a publicly available function. The bilinear pairings, especially Tate pairings, have high performance in cryptography. With... more
    • by 
    •   4  
      Performance AnalysisTate pairingHigh performanceThreshold Signature
    • by 
    •   9  
      EngineeringTechnologyComputer NetworksMobile Ad Hoc Network
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional... more
    • by 
    •   7  
      MathematicsComputer SciencePublic key cryptographyBlind Signature
    • by 
    •   6  
      Public key cryptographyBlind SignatureThreshold SignatureDiffie-Hellman-DSA
    • by 
    •   5  
      Mobile AgentsProtocol CompositionMobile AgentThreshold Signature
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an... more
    • by 
    •   5  
      CryptographyThreshold SignatureDiscrete LogarithmIdentity-based signature
    • by 
    •   11  
      Relational DatabasePreventionDatabasesLanguage Policy
Multipath routing in Wireless Sensors Networks (WSNs) is used in order to tolerate node failures and improve the reliability of data routing. To make a multipath routing algorithm adaptive to the sensitivity of the used application,... more
    • by 
    •   5  
      Routing algorithmRoute DiscoveryMultipath RoutingThreshold Signature
    • by 
    •   5  
      MathematicsComputer ScienceBlind SignatureThreshold Signature
    • by 
    •   19  
      CryptographyPure MathematicsSecurity RequirementsCryptology
    • by 
    •   3  
      Time ComplexityRandom Oracle ModelThreshold Signature
It has been demonstrated by Bellare, Neven, and Namprempre (Eurocrypt 2004) that identity-based signature schemes can be constructed from any PKI-based signature scheme. In this paper we consider the following natural extension: is there... more
    • by 
    •   9  
      Applied MathematicsProvable SecurityBlind SignatureNumerical Analysis and Computational Mathematics
    • by 
    •   8  
      EngineeringMathematical SciencesSecurity RequirementsThreshold Signature
In this paper, we propose a Directed Threshold Multi-Signature Scheme. In this threshold signature scheme, any malicious set of signers cannot impersonate any other set of signers to forge the signatures. In case of forgery, it is... more
    • by 
    •   3  
      Digital SignatureThreshold SignatureSignature Scheme
    • by 
    •   5  
      Operating SystemsDigital SignatureMobile AgentThreshold Signature
    • by 
    •   8  
      Digital SignatureSecurity ManagementSignature VerificationComputational Efficiency
    • by 
    •   6  
      EngineeringCryptographyMathematical SciencesSignature
In a threshold RSA signature scheme, dishonest participants can disrupt signature generation by submitting junk instead of their partial signatures. A threshold signature system is robust if it allows generation of correct signatures for... more
    • by 
    •   3  
      Information Security and CryptologyThreshold SignatureSignature Scheme
Mobile Ad Hoc Networks (MANET), due to their lack of physical infrastructures or centralized authorities, pose a number of security challenges to a protocol designer. In particular, several typical application scenarios demand the design... more
    • by 
    •   9  
      Distributed ComputingMobile Ad Hoc NetworksProtocol DesignMobile Ad Hoc Network
    • by 
    •   10  
      CryptographyOracleDurabilitySharing
    • by 
    •   6  
      RSAThreshold CryptographySecret SharingThreshold Signature
    • by 
    •   7  
      Information ScienceDigital SignatureProvable SecurityInformation Science and Engineering
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented (8) by Ghodosi and Pieprzyk. The advan- tages of the new scheme compared with previously proposed solutions are its... more
    • by 
    •   6  
      Digital SignatureSecurity ManagementSignature VerificationComputational Efficiency
This paper develops an authentication framework for heterogeneous wireless sensor networks. We Introduce a novel concept, called k-security, in order to thwart the impact of false alerts emanating from malicious sensor nodes. The proposed... more
    • by 
    •   14  
      Wireless Sensor NetworksCryptographyElliptical Curve Cryptography for Wirless Sensor NetworksSensors