AbstractIn this paper, we present two schemes for embedding multiple subliminal messages into one-time signature schemes (OTSSs) proposed by Lamport (1971, 1981) [35,36]. Our schemes have the advantage that the subliminal receivers cannot forge a valid signature since they do not share the signer’s secret key. Our schemes can also provide more than one independent subliminal message, and the numbers of subliminal messages and receivers are larger than that of the subliminal messages in previous schemes
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
We present a related family of authentication and digital signature protocols based on symmetric cry...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
[[abstract]]A digital signature with a subliminal channel, that allows a signer to embed subliminal ...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceS...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceS...
Multi-verifier signatures generalize traditional digital signatures to a secret-key setting. Just li...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
In Oops, I did it again - Security of One-Time Signatures under Two-Message Attacks, Bruinderink a...
The future of the hash based digital signature schemes appears to be very bright in the upcoming qua...
A multi-signature scheme allows a group of signers to collaboratively sign a message, creating a si...
In view of the known function of the subliminal channel which is used to provide a high level authen...
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermi...
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermi...
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
We present a related family of authentication and digital signature protocols based on symmetric cry...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
[[abstract]]A digital signature with a subliminal channel, that allows a signer to embed subliminal ...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceS...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceS...
Multi-verifier signatures generalize traditional digital signatures to a secret-key setting. Just li...
AbstractWe present threshold DSS (digital signature standard) signatures where the power to sign is ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
In Oops, I did it again - Security of One-Time Signatures under Two-Message Attacks, Bruinderink a...
The future of the hash based digital signature schemes appears to be very bright in the upcoming qua...
A multi-signature scheme allows a group of signers to collaboratively sign a message, creating a si...
In view of the known function of the subliminal channel which is used to provide a high level authen...
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermi...
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermi...
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
We present a related family of authentication and digital signature protocols based on symmetric cry...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...