搜索结果: 1-11 共查到“军事学 Identity-based signature”相关记录11条 . 查询时间(0.125 秒)
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
cryptographic protocols cryptographic algorithms
2018/11/19
Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorith...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature Full Aggregation
2012/6/14
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
public-key cryptography / Identity Based Deterministic Signature Aggregate Signature Full Aggregation Random Oracle Model, Provable Security
2012/3/20
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature
2012/8/28
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Online/Offline Identity-Based Signature Wireless Sensor Network
2010/1/18
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor
network (WSN). We argue that due to significant reduction in computational and storage costs, our
...
A New Blind Identity-Based Signature Scheme with Message Recovery
Blind Identity Based Signature Scheme Message Recovery
2009/6/2
Anonymity of consumers is an essential
functionality that should be supported in e-cash systems,
locations based services, electronic voting systems as well as
digital rights management system. Pri...
We introduce a new cryptographic primitive which is the signature analogue of fuzzy
identity based encryption(IBE). We call it fuzzy identity based signature(IBS). It
possesses similar error-toleran...
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
Exponent Group Signature Schemes Efficient Identity Signature Schemes
2009/4/13
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.
A Biometric Identity Based Signature Scheme
Biometric Identity Signature biometric information
2009/3/27
We describe an identity based signature scheme that uses biometric information to construct the
public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signe...
The Exact Security of an Identity Based Signature and its Applications
ID-based cryptography signatures signcryption
2009/3/26
This paper first positively answers the previously open question of whether it was
possible to obtain an optimal security reduction for an identity based signature (IBS) under a
reasonable computati...
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Hierarchical identity-based signature signcryption bilinear pairings
2009/3/17
We construct the first constant-size hierarchical identity-based signature (HIBS)
without random oracles - the signature size is O(s) bits, where s is the security parameter,
and it is independent...