We consider the problem of detecting and locating modifications in signed data to ensure partial data integrity. We assume that the data is divided into $n$ blocks (not necessarily of the same size) and that a threshold $d$ is given for the maximum amount of modified blocks that the scheme can support. We propose efficient algorithms for signature and verification steps which provide a reasonably compact signature size, for controlled sizes of $d$ with respect to $n$. For instance, for fixed $d$ the standard signature size gets multiplied by a factor of $O(\log n)$, while allowing the identification of up to $d$ modified blocks. Our scheme is based on nonadaptive combinatorial group testing and cover-free families.Comment: 14 page
[[abstract]]Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual ...
Batch verification of digital signatures is used to improve the computational complexity when large ...
We present new schemes for solving prefix authentication and secure relative timestamping. By castin...
The common assumption about digital signatures is that they disallow any kind of modification on sig...
The common assumption about digital signatures is that they disallow any kind of modification on sig...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We construct both randomizable and strongly existentially unforgeable structure-preserving signature...
In order to make people truly benefit from data sharing, we need technical solutions to assuring the...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
A novel definition of stability regions and a new method for detecting them from on-line signatures...
International audienceIn this paper we present three digital signature schemes with tight security r...
www.minicrypt.de Abstract. Sanitizable signatures have been introduced by Ateniese et al. (ESORICS 2...
Abstract. Despite considerable research efforts, no efficient reduction from the discrete log proble...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
Membership revocation, being an important property for applications of group signatures, represents ...
[[abstract]]Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual ...
Batch verification of digital signatures is used to improve the computational complexity when large ...
We present new schemes for solving prefix authentication and secure relative timestamping. By castin...
The common assumption about digital signatures is that they disallow any kind of modification on sig...
The common assumption about digital signatures is that they disallow any kind of modification on sig...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We construct both randomizable and strongly existentially unforgeable structure-preserving signature...
In order to make people truly benefit from data sharing, we need technical solutions to assuring the...
The article proposes new digital signature schemes based on difficulty of simultaneous solving integ...
A novel definition of stability regions and a new method for detecting them from on-line signatures...
International audienceIn this paper we present three digital signature schemes with tight security r...
www.minicrypt.de Abstract. Sanitizable signatures have been introduced by Ateniese et al. (ESORICS 2...
Abstract. Despite considerable research efforts, no efficient reduction from the discrete log proble...
The RSA scheme is used to sign messages; however, in order to avoid forgeries, a message can be padd...
Membership revocation, being an important property for applications of group signatures, represents ...
[[abstract]]Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual ...
Batch verification of digital signatures is used to improve the computational complexity when large ...
We present new schemes for solving prefix authentication and secure relative timestamping. By castin...