Filters








16,187 Hits in 2.4 sec

Anonymous Signatures Revisited [chapter]

Vishal Saraswat, Aaram Yun
2009 Lecture Notes in Computer Science  
We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13] .  ...  We present a new formalism of anonymous signature, where instead of the message, a part of the signature is withheld to maintain anonymity.  ...  Also, a reviewer suggested possibility of commitmentbased generic construction of anonymous signatures.  ... 
doi:10.1007/978-3-642-04642-1_13 fatcat:6bab63dcqffshbqfbmmseyzawi

Anonymity from Public Key Encryption to Undeniable Signatures [chapter]

Laila El Aimani
2009 Lecture Notes in Computer Science  
In this context, we revisit a well known undeniable signature scheme, whose security remained an open problem for over than a decade, and prove that it is not anonymous.  ...  Next, we constructively use anonymous encryption together with secure digital signature schemes to build anonymous convertible undeniable signatures.  ...  Besides, since the notion of anonymity is formalized for encryption schemes, it would be good to see whether one could constructively use anonymous encryption to build anonymous undeniable signatures using  ... 
doi:10.1007/978-3-642-02384-2_14 fatcat:tw52l37cpvb4ji4roq554k6tcq

Anonymous Authentication from Public-Key Encryption Revisited [chapter]

Daniel Slamanig
2011 Lecture Notes in Computer Science  
do not suffer from linear complexity such as ring signatures.  ...  However, there are quite different constructions like ring [5] and group signatures [1] to solve this task.  ...  do not suffer from linear complexity such as ring signatures.  ... 
doi:10.1007/978-3-642-24712-5_26 fatcat:7dtfvx6hpvbatbzkbpwpend66m

Controllable Ring Signatures and Its Application to E-Prosecution

Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie
2013 Journal of Computers  
And this proof is non-transferable. (2) Linkable signature: the real signer can generate an anonymous signature such that every one can verify whether both this anonymous signature and the ring signature  ...  This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol  ...  We would like to express our gratitude thanks to the anonymous referees of WISA 2006 for their invaluable suggestions to improve this paper.  ... 
doi:10.4304/jcp.8.4.833-841 fatcat:5xka2snexndlliujr3ntkhvwzq

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt" [chapter]

Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
2013 Lecture Notes in Computer Science  
This paper revisits the relationship amongst privacy notions for signcryption. We prove that key invisibility implies ciphertext anonymity without any additional restrictions.  ...  Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures  ...  Sign-then-Encrypt Generic Construction In this section, we revisit the generic construction of signcryption schemes based on the sign-then-encrypt method [1, 2] .  ... 
doi:10.1007/978-3-642-39059-3_13 fatcat:2aobk6yqnjgkxoistefulrs3bi

Short Linkable Ring Signatures Revisited [chapter]

Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
2006 Lecture Notes in Computer Science  
Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was generated by one member of  ...  Linkable ring signature is a variant such that two signatures can be linked if and only if they were signed by the same person. Recently, the first short linkable ring signature has been proposed.  ...  Anonymity in ring signatures means 1-out-of-n signer verifiability, which enables the signer to keep anonymous in these "rings" of diversion signers.  ... 
doi:10.1007/11774716_9 fatcat:ziglodnwz5cc7gxbajkxfnbptm

Democratic group signatures with threshold traceability

Xiang-xue Li, Hai-feng Qian, Jian-hua Li
2009 Journal of Shanghai Jiaotong University (Science)  
Recently, democratic group signatures(DGSs) particularly catch our attention due to their great flexibilities, i.e., no group manager, anonymity, and individual traceability.  ...  In this paper, we formally describe the definition of DGS, revisit its security notions by strengthening the requirement for the property of traceability, and present a concrete DGS construction with (  ...  We revisit the requirement of individual traceability described in [19] by presenting the term threshold traceability. We express (t, n) threshold traceability for DGSs as the following.  ... 
doi:10.1007/s12204-009-0098-z fatcat:jqlxs7szj5bqfh2sjdy6fonk6y

DAA-Related APIs in TPM 2.0 Revisited [chapter]

Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng
2014 Lecture Notes in Computer Science  
In TPM2.0, a single signature primitive is proposed to support various signature schemes including Direct Anonymous Attestation (DAA), U-Prove and Schnorr signature.  ...  Then we propose new APIs which not only remove the Static Diffie-Hellman oracle but also support the forward anonymity, thus significantly improve the security of DAA and the other signature schemes supported  ...  While DAA signatures can be totally anonymous, a pseudonymous DAA signature can be linked to another signature by using a specific basename.  ... 
doi:10.1007/978-3-319-08593-7_1 fatcat:6umuzygfsffi3bfdzfjowvd3sa

Hybrid Trapdoor Commitments and Their Applications [chapter]

Dario Catalano, Ivan Visconti
2005 Lecture Notes in Computer Science  
"Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Fac- toring" (with R.Gennaro) Theoretical Computer Science Vol. 370, pages 186-200, 2007. 5.  ...  "Searchable Encryption Revisited: Consistency Conditions, Relation to Anonymous IBE, and Extensions" (with M.Abdalla, M.Bellare, E.Kiltz, T.Kohno, T.Lange, J.Malone-Lee, G.Neven, P.Paillier and H.Shi  ... 
doi:10.1007/11523468_25 fatcat:dkf42t7e6zcizpqaxiuafqpswu

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [article]

Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi
2014 arXiv   pre-print
To cope with this issue, we propose a protocol that uses identity-based encryption for packet encryption without sacrificing anonymity, and group signature for anonymous user authentication.  ...  Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.  ...  Finally, we revisit non-frameability. Non-frameability guarantees that no adversary A can produce a valid group signature whose open result is an honest (i.e., uncorrupted by A) user (say U ).  ... 
arXiv:1403.7014v3 fatcat:clceb7i2dnc5hf3setjxwkjlbe

Page 451 of Genetics Vol. 178, Issue 1 [page]

2008 Genetics  
LANGLEY, 1989 The “hitch- hiking effect” revisited. Genetics 123: 887-899. Kim, Y., and R. NIELSEN, 2004 Linkage disequilibrium as a signature of selective sweeps. Genetics 167: 1513-1524.  ...  An Accurate Model for We thank an anonymous referee for bringing two references (INNAN and Kim 2004; Kim and NIeELsen 2004) to our attention. B.M. acknowledges support from Vetenskapsradet.  ... 

Revisiting Optimistic Fair Exchange Based on Ring Signatures

Yang Wang, Man Ho Allen Au, Willy Susilo
2014 IEEE Transactions on Information Forensics and Security  
They showed that an efficient optimistic fair exchange scheme secure in this sense can be constructed generically from a conventional digital signature and a two-party ring signature.  ...  They showed that an efficient optimistic fair exchange scheme secure in this sense can be constructed generically from a conventional digital signature and a two-party ring signature.  ...  Next, we revisit Huang et al.'  ... 
doi:10.1109/tifs.2014.2354986 fatcat:blas76uwb5hs3ar5kzlmdwz3hi

Page 751 of The Historical Journal Vol. 48, Issue 3 [page]

2005 The Historical Journal  
The vigorous protests against the proposed measure (including a petition of 1,737 signatures and virulent anonymous letters to the sous-préfet) were to no effect.“® As the Millau inspecteur primaire put  ...  THE ‘MILCH-COW STATE’ REVISITED 751 paralyser les attaques de milliers de prédicateurs des deux sexes, et il est a craindre que les populations, fanatisées de longue date, ne deviennent décidément hostiles  ... 

Page 280 of The Library Vol. 6, Issue 3 [page]

2005 The Library  
Chere now follow attributions of authorship for 374 anonymous, pseudo nymous, or signed items appearing in the AJR, 1807-21 (vols 26-61).  ...  Since many ‘signed’ articles bear signatures that are partial at best, I have made every effort to provide the fullest possible renderings of authors’ names, together with birth and death dates and professions  ... 

Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation

Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
2016 IEEE Transactions on Emerging Topics in Computing  
To cope with this issue, we propose a secure and anonymous communication protocol by employing identity-based encryption for encrypting packets without sacrificing anonymity, and group signature for anonymous  ...  However, secure and anonymous communication protocol that requires both anonymity and end-to-end encryption cannot be realized through a simple combination of current anonymous communication protocols  ...  An open-free group signature GS is said to have unforgeability if Adv un GS,A (λ) := Pr[A wins] is negligible in λ. Finally, we revisit non-frameability.  ... 
doi:10.1109/tetc.2015.2400131 fatcat:6ij3ckwrgbcmnduowswhp52ije
« Previous Showing results 1 — 15 out of 16,187 results