搜索结果: 1-9 共查到“军队指挥学 identity-based signatures”相关记录9条 . 查询时间(0.187 秒)
The Legal Classification of Identity-Based Signatures
digital signatures electronic signatures
2014/3/13
Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the l...
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles—Extended Version—
Post-quantum cryptography lattice cryptography digital signatures identity-based cryptography
2010/2/20
We propose a variant of Peikert's lattice-based existentially
unforgeable signature scheme in the standard model. Our construction
offers the same eciency as Peikert's but supports the stronger not...
How to Construct Identity-Based Signatures without the Key Escrow Problem?
Construct Identity-Based Signatures Key Escrow Problem
2009/9/2
The inherent key escrow problem is one of the main reasons for the slow adoption
of identity-based cryptography. The existing solution for mitigating the key escrow problem
is by adopting multiple P...
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Designated Verifier Signature Identity-Based Signature Digital Signature Schemes
2009/6/2
We give a generic construction for universal designated-verifier signature schemes from a large class, C, of
signature schemes. The resulting schemes are efficient and have two important properties. ...
Deterministic Identity-Based Signatures for Partial Aggregation
Deterministic Identity-Based Signatures Partial Aggregation
2009/3/4
Aggregate signatures are a useful primitive which allows to aggregate into
a single and constant-length signature many signatures on dierent messages
computed by dierent users. Specic proposals o...
On the Generic Construction of Identity-Based Signatures with Additional Properties
Signatures with Additional Properties Identity-Based Cryptography
2008/12/16
It has been demonstrated by Bellare, Neven, and Namprempre (Eurocrypt 2004) that
identity-based signature schemes can be generically constructed from standard digital sig-
nature schemes. In this pa...
Efficient Identity-based Signatures Secure in the Standard Model
Efficient Identity-based Signatures Secure Standard Model
2008/11/3
The only known construction of identity-based signatures that can be proven secure
in the standard model is based on the approach of attaching certificates to non-identity-based
signatures. This fol...
Hidden Identity-Based Signatures
Anonymity and Privacy Identity-based schemes Digital Signatures Onion-routing
2008/9/3
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signatures. The motivation of...
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Designated Verifier Signature, Identity-Based Signature, Digital Signature Schemes, Signature
2008/5/20
We give a generic construction for universal designated-verifier signature schemes from a large class, C, of
signature schemes. The resulting schemes are efficient and have two important properties. ...