. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such that every path from a leaf to the root meets at least one of these vertices. An order relation on the set of minmal cutsets can be defined: U V if and only if every vertex of U is on the path from some vertex in V to the root. Motivated by the design of efficient cryptographic digital signature schemes, the problem of constructing trees with a large number of pairwise incomparable minimal cutsets or, equivalently, with a large antichain in the poset of minimal cutsets, is considered. Such signature schemes can be computationally more efficient than previously proposed signature schemes based on number-theoretic problems, they allow to base ...
We introduce the notion of oblivious data structure, motivated by the use of data structures in cryp...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
Essentially all known one-time signature schemes can be described as special instances of a general ...
. Digital signature schemes based on a general one-way function without trapdoor offer two potential...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
In this paper, we present another tree-structure signature scheme based on discrete logarithm proble...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
Abstract. One-time signatures (OTS) offer a viable alternative to public keybased digital signatures...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
Leakage-free authentication of trees and graphs have been studied in the literature. Such schemes ha...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
AbstractTransitive signatures allow a signer to authenticate edges in a graph, in such a way that an...
International audienceIn this paper we present three digital signature schemes with tight security r...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
B-tree with fixed node size and no minimum degree In anti-virus and anti-spyware applications, due t...
We introduce the notion of oblivious data structure, motivated by the use of data structures in cryp...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
Essentially all known one-time signature schemes can be described as special instances of a general ...
. Digital signature schemes based on a general one-way function without trapdoor offer two potential...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
In this paper, we present another tree-structure signature scheme based on discrete logarithm proble...
Abstract. We give a direct construction of digital signatures based on the complexity of approximati...
Abstract. One-time signatures (OTS) offer a viable alternative to public keybased digital signatures...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
Leakage-free authentication of trees and graphs have been studied in the literature. Such schemes ha...
Abstract. In this paper we present three digital signature schemes with tight security reductions. O...
AbstractTransitive signatures allow a signer to authenticate edges in a graph, in such a way that an...
International audienceIn this paper we present three digital signature schemes with tight security r...
We give a new framework for obtaining signatures with a tight security reduction from standard hardn...
B-tree with fixed node size and no minimum degree In anti-virus and anti-spyware applications, due t...
We introduce the notion of oblivious data structure, motivated by the use of data structures in cryp...
We study the efficiency of the treeless signature schemes [Lyu08], [Lyu09], [Lyu12] and evaluate the...
Essentially all known one-time signature schemes can be described as special instances of a general ...