Abstract. Signature schemes with message recovery have been wildly investigated a decade ago in the literature, but the first ID-based signature with message recovery goes out into the world until 2005. In this paper, we first point out and revise one little but important problem which occurs in the previous ID-based signature with message recovery scheme. Then, by completely different setting, we propose a new ID-based signature scheme with message recovery. Our scheme is much more efficient than the previous scheme. In our scheme (as well as other signature schemes with message recovery), the message itself is not required to be transmitted together with the signature, it turns out to have the least data size of communication cost compari...
Digital signatures provide the functions of integrity, authenticity, and non-repudiation for signing...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
Signature schemes with message recovery have been wildly investigated a decade ago in the literatur...
Many ID-based strong designated verifier signature schemes have been proposed in recent years. Howev...
A digital signature with message recovery is a signature that the message itself (or partial of the ...
With the rapid development of modern technology, personal privacy has become a critical concern in m...
[[abstract]]In this article, we shall adopt the concepts of elliptic curve cryptosystems and self-ce...
ID-based message recovery signature is a kind of lightweight signature. In such a signature scheme, ...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
We present a new notion called the attribute-based signa- ture with message recovery. Compared with ...
Attribute-based signature with message recovery We present a new notion called the attribute-based s...
[[abstract]]A secure signature scheme with providing variant batch verifications ex- tremely improve...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Blind signatures enable users to obtain valid signatures for a message without revealing its content...
Digital signatures provide the functions of integrity, authenticity, and non-repudiation for signing...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
Signature schemes with message recovery have been wildly investigated a decade ago in the literatur...
Many ID-based strong designated verifier signature schemes have been proposed in recent years. Howev...
A digital signature with message recovery is a signature that the message itself (or partial of the ...
With the rapid development of modern technology, personal privacy has become a critical concern in m...
[[abstract]]In this article, we shall adopt the concepts of elliptic curve cryptosystems and self-ce...
ID-based message recovery signature is a kind of lightweight signature. In such a signature scheme, ...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
We present a new notion called the attribute-based signa- ture with message recovery. Compared with ...
Attribute-based signature with message recovery We present a new notion called the attribute-based s...
[[abstract]]A secure signature scheme with providing variant batch verifications ex- tremely improve...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
Blind signatures enable users to obtain valid signatures for a message without revealing its content...
Digital signatures provide the functions of integrity, authenticity, and non-repudiation for signing...
In traditional public key cryptography, public keys of users are essentially random strings generate...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...