搜索结果: 1-15 共查到“军队指挥学 Aggregate Signatures”相关记录19条 . 查询时间(0.093 秒)
Fast Authentication from Aggregate Signatures with Improved Security
Authentication Digital signatures Universal forgery
font style='font-size:12px;'>
2018/11/30
An attempt to derive signer-efficient digital signatures from aggregate signatures was made in a signature scheme referred to as Structure-free Compact Rapid Authentication (SCRA) (IEEE TIFS 2017). In...
Synchronized Aggregate Signatures from the RSA Assumption
signatures aggregate RSA
font style='font-size:12px;'>
2018/1/25
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Aggregate signatures trapdoor permutations ideal cipher model
font style='font-size:12px;'>
2018/1/19
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
font style='font-size:12px;'>
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
font style='font-size:12px;'>
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Fault-Tolerant Aggregate Signatures
Aggregate Signatures Fault-Tolerance Cover-free Family
font style='font-size:12px;'>
2016/1/27
Aggregate signature schemes allow for the creation of a short
aggregate of multiple signatures. This feature leads to significant reductions
of bandwidth and storage space in sensor networks, secure...
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
full domain hash identity-based aggregate signatures
font style='font-size:12px;'>
2014/3/11
In this work, we explore building constructions with full domain hash structure, but with standard model proofs that do not employ the random oracle heuristic. The launching point for our results will...
Sequential Aggregate Signatures Made Shorter
Public-key signature Aggregate signature
font style='font-size:12px;'>
2014/3/12
Sequential aggregate signature (SAS) is a special type of public-key signature that allows a signer to add his signature into a previous aggregate signature in sequential order. In this case, since ma...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature Full Aggregation
font style='font-size:12px;'>
2012/6/14
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
public-key cryptography / Identity Based Deterministic Signature Aggregate Signature Full Aggregation Random Oracle Model, Provable Security
font style='font-size:12px;'>
2012/3/20
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
public-key cryptography / aggregate signatures RSA BGPsec
font style='font-size:12px;'>
2012/3/28
Sequential aggregate signature schemes allow n signers, in order, to sign a message each, at a lower total cost than the cost of n individual signatures. We present a sequential aggregate signature sc...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature
font style='font-size:12px;'>
2012/8/28
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
font style='font-size:12px;'>
2012/3/28
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
font style='font-size:12px;'>
2011/6/8
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
Identity Based Dererministic Signature Aggregate Signature Full Aggregation Random Oracle Model Provable Security
font style='font-size:12px;'>
2010/9/26
Fully aggregateable identity based signature schemes without prior communication between the signing parties is an interesting issue in identity based cryptography. On this front, we identify that det...