We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [10], and then further developed by Fischlin [4] and Zhang and Imai [11]. We present a new formalism of anonymous signature, where instead of the message, a part of the signature is withheld to maintain anonymity. We introduce the notion unpretendability to guarantee infeasibility for someone other than the correct signer to pretend authorship of the message and signature. Our definition retains applicability for all previous applications of the anonymous signature, provides stronger security, and is conceptually simpler. We give a generic construction from any ordinary signature scheme, and also show that the short signature scheme by Boneh and ...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
First a detailed definition of group signatures, originally suggested by Chaum and van {Heijst}, is ...
[[abstract]]Anonymous proxy signature schemes are used to protect proxy signers' privacy. Among the ...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
Undeniable signature is a special featured digital signature which can only be verified with the hel...
Abstract. In this paper, we introduce P-signatures. A P-signature scheme consists of a signature sch...
Undeniable signature is a special featured digital signature which can only be verified with the hel...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
We present a new revocable anonymous protocol for the undeniable signatures. Our scheme allows some ...
We introduce Partial Signatures, where a signer, given a message, can compute a “stub ” which preser...
Abstract. Proxy signatures enable an originator to delegate the signing rights for a re-stricted set...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
First a detailed definition of group signatures, originally suggested by Chaum and van {Heijst}, is ...
[[abstract]]Anonymous proxy signature schemes are used to protect proxy signers' privacy. Among the ...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
Digital signature is one of the most important primitives in public key cryptography. It provides au...
Undeniable signature is a special featured digital signature which can only be verified with the hel...
Abstract. In this paper, we introduce P-signatures. A P-signature scheme consists of a signature sch...
Undeniable signature is a special featured digital signature which can only be verified with the hel...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
We present a new revocable anonymous protocol for the undeniable signatures. Our scheme allows some ...
We introduce Partial Signatures, where a signer, given a message, can compute a “stub ” which preser...
Abstract. Proxy signatures enable an originator to delegate the signing rights for a re-stricted set...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
First a detailed definition of group signatures, originally suggested by Chaum and van {Heijst}, is ...
[[abstract]]Anonymous proxy signature schemes are used to protect proxy signers' privacy. Among the ...