A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient Identity-Based Signatures Secure in the Standard Model
[chapter]
2006
Lecture Notes in Computer Science
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures. ...
The scheme's security is proven in the standard model and rests on the hardness of the computational Diffie-Hellman problem in groups equipped with a pairing. ...
Acknowledgment We thank Jonathan Katz, Eike Kiltz and an anonymous reviewer for pointing out the folklore certification-based construction for identity-based signatures. ...
doi:10.1007/11780656_18
fatcat:5f2ihxbu6jaxtfc6ixc3imby3e
Secure Short Hierarchical Identity-Based Signature in the Standard Model
2010
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
In this paper, a new short hierarchical identity-based signature (HIBS) scheme is proposed in the standard model. ...
This assumption is more natural than many of the hardness assumptions recently introduced to HIBS in the standard model ...
The new scheme is constructed in the standard model and has a constant-size signature. ...
doi:10.1109/nswctc.2010.90
fatcat:gaampqkcsrepjcnu2eepohewse
A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
2014
Mathematical Problems in Engineering
To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model. ...
In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. ...
A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model We introduce our lattice-based identity-based proxy blind signature scheme in the standard model in this section which ...
doi:10.1155/2014/307637
fatcat:lx7wvv2bxzgh3ilz6egqreytw4
Identity-Based Ring Signature Scheme with Constant Size Signatures in the Standard Model
2012
Chinese Journal of Computers
Adaptive-ID Secure Identity-Based Signature Scheme from Lattices in the Standard Model
2017
IEEE Access
Index Terms-Adaptive identity, identity-based signature, lattice, security, standard model. ...
Identity-based signature (IBS) which is a paradigm built on public key cryptography has played a significant role in light-weight authentication. ...
THE NEW IDENTITY-BASED SIGNATURE SCHEME
A. ...
doi:10.1109/access.2017.2757464
fatcat:f7ueeffjmjf3pcawzci2mnpeli
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
2014
Mathematical Problems in Engineering
the standard model. ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identityIDto issue a signature that could be verified with identityID'if and only ifIDandID'lie within a certain distance. ...
(SU-sID-CMA) in the standard model. ...
doi:10.1155/2014/391276
fatcat:54ykvzfbjvcklf2iwz76zvvwfm
Efficient identity-based threshold signature scheme from bilinear pairings in standard model
2014
International Journal of Internet Protocol Technology
It is proved secure with optimal resilience in the standard model. ...
We propose a new identity-based threshold signature (IBTHS) scheme from bilinear pairings enjoying the following advantages in efficiency, security and functionality. ...
Theorem 1 The Paterson-Schuldt identity-based signature scheme is (t, q e , q s , t) unforgeable against adaptive chosen identity and message attack in the standard model, assuming that the CDH problem ...
doi:10.1504/ijipt.2014.066373
fatcat:s7c63jqjsjcmldux77z6v4gpsy
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions
2020
Journal of Internet Services and Information Security
In this paper, we provide, for the first time, concrete constructions of unidirectional IB-PRE and IB-PRS which are secure in standard model based on the hardness of learning with error problem and small ...
Unfortunately, till today, there is no unidirectional IB-PRE and IB-PRS secure in the standard model, which can withstand quantum attack. ...
Further, they proposed unidirectional identity-based PRE [34] , termed as IB-uPRE, secure in the random oracle model. ...
doi:10.22667/jisis.2020.11.30.001
dblp:journals/jisis/DuttaSDBR20
fatcat:2ewtz635rrchtfnckdi2ypurdy
On the generic construction of identity-based signatures with additional properties
2010
Advances in Mathematics of Communications
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general ...
In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably ...
An efficient VES scheme in the random oracle model based on pairings was given in [7] , one in the standard model in [25] . ...
doi:10.3934/amc.2010.4.453
fatcat:zpdvgtqncvdcpiwjqzox3723ei
Strong Identity-Based Proxy Signature Schemes, Revisited
2018
Wireless Communications and Mobile Computing
We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. ...
There have been lots of works in constructing efficient and secure proxy signature schemes. ...
Security Model for Proxy Signature
Malicious Attackers. We revise the security model for identity-based proxy signature defined in [13] to capture the new attack in this section. ...
doi:10.1155/2018/6925019
fatcat:qry5pgjyzvbevjgn2kwsqswd34
On the Generic Construction of Identity-Based Signatures with Additional Properties
[chapter]
2006
Lecture Notes in Computer Science
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general ...
In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably ...
An efficient VES scheme in the random oracle model based on pairings was given in [7] , one in the standard model in [25] . ...
doi:10.1007/11935230_12
fatcat:xmzndw3plzhqhbk4ryc5g6wb34
New Identity-based Short Signature Without Random Oracles
2011
Procedia Engineering
A new identity-based short signature(IBS) is proposed in this paper. The new scheme is constructed in the standard model and has short public parameters and private keys. ...
In addition, the size of the signature achieves 320 bits, which is much more efficient than the existing IBS schemes. ...
Efficiency : The well known identity-based signature in the standard model is issued by Paterson [17] . But it's signature size is 480 bits. The size of our scheme achieves 320 bits. ...
doi:10.1016/j.proeng.2011.08.645
fatcat:owiyzbfvxrgzxb2pxgvfec7opy
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues
2011
Information & Security An International Journal
The main challenge for SOA security still drifts around 'clouds' and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. ...
The paper's main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level ...
Also, the Liberty Alli-ance published ID-WSF (Identity Web Services Framework) which is based on SAML 2.0. These two standards are most used in modelling federated identity. ...
doi:10.11610/isij.2710
fatcat:2o2n4a7jczekpntowlar4w24iu
Research on Strongly Unforgeable Ring Signature Scheme Based on ID
2014
IOSR Journal of Computer Engineering
s ID-based ring signature scheme, then we construct a strongly unforgeable ID-based ring signature scheme in the standard model based on the standard discrete logarithm problem (DLP). ...
A ring signature system is strongly unforgeable if the ring signature is existential unforgeable and, given ring signatures on some message m, the adversary can not produce a new ring signature on m. ...
's ID-based ring signature scheme in standard model, we proposed astrongly unforgeable ring signature scheme in the standard model. ...
doi:10.9790/0661-16595559
fatcat:2slzsxkhlngw5lmhfmj6htjahe
Multiple statistical signatures of human confidence
[article]
2018
bioRxiv
pre-print
Here, we show that the standard model is a special case in which evidence about stimulus strength is omitted in the objective calculation of confidence. ...
AbstractThe so called standard model of confidence predicts a specific statistical signature of confidence that has been widely used to objectively identify neural, behavioural, and physiological correlates ...
Fig 3 3 shows the statistical signatures of confidence obtained from simulations based on the standard model. ...
doi:10.1101/426635
fatcat:favommm7qrhzvmz7lyg4vpl47q
« Previous
Showing results 1 — 15 out of 323,059 results