[[abstract]]A secure signature scheme with providing variant batch verifications ex- tremely improves the verification performance for many cooperative and distributed appli- cations. The identity (ID)-based public key system can simplify certificate management as compared to certificated-based public key systems. With the advent of the ID-based public key system using bilinear pairings defined on elliptic curves, many ID-based sig- nature schemes have been proposed. Recently, Cha and Cheon proposed a new ID-based signature scheme which is more efficient than the previously proposed schemes, but their scheme does not offer batch verifications for multiple signatures because their scheme suffers from forgery attacks for batch verifications. ...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Signature schemes with message recovery have been wildly investigated a decade ago in the literatur...
We propose a strongly secure certificateless signature scheme supporting batch verification, which m...
To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the proble...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
Abstract. Signature schemes with message recovery have been wildly investigated a decade ago in the ...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Abstract. Batch verification can provide large computational savings when several signatures, or oth...
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number...
The only known construction of identity-based signatures that can be proven secure in the standard m...
Motivated by privacy issues associated with dissemination of signed digital certificates, we define ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Signature schemes with message recovery have been wildly investigated a decade ago in the literatur...
We propose a strongly secure certificateless signature scheme supporting batch verification, which m...
To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the proble...
[[abstract]]Recently, the notion of the key-insulated public- key system has been suggested to prote...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
Abstract. Signature schemes with message recovery have been wildly investigated a decade ago in the ...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Abstract. Batch verification can provide large computational savings when several signatures, or oth...
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number...
The only known construction of identity-based signatures that can be proven secure in the standard m...
Motivated by privacy issues associated with dissemination of signed digital certificates, we define ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
AbstractPrivate key exposure can be the most devastating attack on cryptographic schemes; as such ex...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Signature schemes with message recovery have been wildly investigated a decade ago in the literatur...