The definition of XTR system, which is based on the elements' trace compact denotation in the subgroup of the multiplicative group of the finite field, is a new public key system. We propose two signature schemes based on XTR system with short key length, the quick speed of choosing parameters, and the less amount of computation. And we also show our signature schemes are proven secure by using forking lemma in the random oracle model. The security of our schemes is equivalent to solve the discrete logarithm in XTR group.EI01305-312
Recently, four classed of blind signature schemes have been introduced: the hidden, the weak blind,...
One of the important objectives of information security systems is providing authentication of the e...
We present the latest formal security definitions for blind signature schemes and for group signatur...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
Abstract: Proxy blind signature is a cryptographic research hotspot, and has been applied in many oc...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
This paper presents a proxy blind signature scheme with forward security mechanism. The proposed dig...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
Blind signatures provide a mechanism for achieving privacy and anonymity whereby a user gets the sig...
We construct a short group signature scheme. Signatures in our scheme are approximately the size of ...
Recently, four classed of blind signature schemes have been introduced: the hidden, the weak blind,...
One of the important objectives of information security systems is providing authentication of the e...
We present the latest formal security definitions for blind signature schemes and for group signatur...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
Abstract: Proxy blind signature is a cryptographic research hotspot, and has been applied in many oc...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of el...
This paper presents a proxy blind signature scheme with forward security mechanism. The proposed dig...
AbstractIn proxy signature schemes, original signers delegate proxy signers to sign messages on beha...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
Blind signatures provide a mechanism for achieving privacy and anonymity whereby a user gets the sig...
We construct a short group signature scheme. Signatures in our scheme are approximately the size of ...
Recently, four classed of blind signature schemes have been introduced: the hidden, the weak blind,...
One of the important objectives of information security systems is providing authentication of the e...
We present the latest formal security definitions for blind signature schemes and for group signatur...