Key signature

Results: 1754



#Item
361Cryptographic protocols / Group signature / Ring signature / Digital signature / Communications protocol / Diffie–Hellman key exchange / Public key certificate / Cryptography / Public-key cryptography / Key management

Democratic Group Signatures on Example of Joint Ventures This is a full version of the fast abstract which appears at ASIACCS’2006. Mark Manulis Horst-G¨ortz Institute Ruhr-University of Bochum D-44801, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-20 03:49:54
362Cyberwarfare / Electronic commerce / Civil law / Token coin / Tokens / Group signature / Security / Public key certificate / Digital signature / Cryptography / Key management / Public-key cryptography

Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-11 21:27:39
363Certificateless cryptography / Applied mathematics / Security / Digital signature / BLS / Key signature / RSA / Public-key cryptography / Cryptography / Cyberwarfare

Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro∗ Ricardo Dahab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 13:51:07
364Digital signature / Key management / RSA / Communications protocol / Blind signature / Group signature / Cryptography / Public-key cryptography / Cryptographic protocols

Universally Composable Signature, Certification, and Authentication∗ Ran Canetti† August 15, 2004 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-15 10:02:29
365Universal composability / Digital signature / Ring signature / Model theory / Structure / Cryptography / Public-key cryptography / Cryptographic protocols

How to Break and Repair a Universally Composable Signature Functionality Michael Backes† and Dennis Hofheinz? Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-19 16:37:53
366Key management / Electronic commerce / Bitcoin / Digital signature / Consensus / Blind signature / Don Mills Middle School / Random oracle / Key / Cryptography / Public-key cryptography / Financial cryptography

On Stake and Consensus Andrew Poelstrafe81626

Add to Reading List

Source URL: download.wpsoftware.net

Language: English - Date: 2015-03-22 21:54:43
367Cipher / Symmetric-key algorithm / Digital signature / Commitment scheme / Key generation / Key size / Key / RSA / Initialization vector / Cryptography / Key management / Public-key cryptography

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
368Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
369Digital signature / Group signature / Proof of knowledge / Designated verifier signature / Zero-knowledge proof / RSA / Ring signature / IP / NP / Cryptography / Public-key cryptography / Cryptographic protocols

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti  

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-05 21:04:21
370Certificate authority / Man-in-the-middle attack / Digital signature / Alice and Bob / Public key infrastructure / Public key certificate / RSA / Cryptography / Public-key cryptography / Key management

KEY DISTRIBUTION 1/1 The public key setting

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-06-02 11:33:43
UPDATE