Group signature

Results: 378



#Item
91Electronic commerce / Digital signature / Public key certificate / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Key management

A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 276–285, S. De Capitani di Vimercati and P. Syverson eds., ACM Press, 2007. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-21 16:37:42
92Trusted Computing / Trusted Platform Module / Digital signature / Group signature / RSA / Disk encryption / Public key certificate / Cryptography / Public-key cryptography / Direct Anonymous Attestation

On the Design and Implementation of an Efficient DAA Scheme ? Liqun Chen1 , Dan Page2 , and Nigel P. Smart2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 08:44:26
93Parity of a permutation / Digital signature / Group signature / Model theory / Structure / Blind signature / MIX / Cryptography / Mathematics / Ring signature

Tracing-by-Linking Group Signatures Victor K. Wei Dept. of Information Engineering, Chinese University of Hong Kong, Hong Kong September 18, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-09-17 23:49:43
94RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
95Commitment scheme / RSA / Group signature / Homomorphic signatures for network coding / Spectral theory of ordinary differential equations / Cryptography / Finite fields / XTR

Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer David Pointcheval

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 12:32:39
96Cryptographic protocols / Group signature / Ring signature / Digital signature / Communications protocol / Diffie–Hellman key exchange / Public key certificate / Cryptography / Public-key cryptography / Key management

Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-20 03:49:54
97Cryptography / Group signature / Vehicle Identification Number

Remarks on “Analysis of One Popular Group Signature Scheme” in Asiacrypt 2006 Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 14:28:48
98Cyberwarfare / Electronic commerce / Civil law / Token coin / Tokens / Group signature / Security / Public key certificate / Digital signature / Cryptography / Key management / Public-key cryptography

Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-11 21:27:39
99Digital signature / Key management / RSA / Communications protocol / Blind signature / Group signature / Cryptography / Public-key cryptography / Cryptographic protocols

Universally Composable Signature, Certification, and Authentication∗ Ran Canetti† August 15, 2004 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-15 10:02:29
100Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
UPDATE