Digital signatures are one of the most important consequences of the appearance of public key cryptography, in 1976. These schemes provide authentication, integrity and non-repudiation to digital communications. Some extensions or variations of the concept of digital signature have been introduced, and many specific realizations of these new types of nature schemes have been proposed.In this thesis, we deal with the basic definitions and required security properties of traditional signature schemes and two of its extensions: distributed signature schemes and ring signature schemes. We review the state of the art in these two topics; then we propose and analyze new specific schemes for different scenarios.Namely, we first study distributed s...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Abstract In a distributed ring signature scheme, a subset of users cooperate to compute a distribute...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Abstract: The ring signature is a group signature without a group manager, so that a signer realizes...
Digital signature schemes are ubiquitous in real-world applications of cryptography. They are the co...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Certificateless public key cryptography solves the certificate management problem in the t...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
Abstract. An original digital signature scheme based on action of infinite ring on module is present...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Abstract In a distributed ring signature scheme, a subset of users cooperate to compute a distribute...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Abstract: The ring signature is a group signature without a group manager, so that a signer realizes...
Digital signature schemes are ubiquitous in real-world applications of cryptography. They are the co...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Certificateless public key cryptography solves the certificate management problem in the t...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
Abstract. An original digital signature scheme based on action of infinite ring on module is present...
Abstract: Digital signature scheme is a fundamental cryptographic tool which allows one to sign an e...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...