A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security of BLS and BGLS signatures in a multi-user setting
2017
Cryptography and Communications
A scheme that is secure in the single-user setting may not be as secure in the multi-user setting. ...
We introduce a multi-user security model for general aggregate signature schemes, in contrast to the original "chosen-key" security model of BGLS that is analogous to the single-user setting of a signature ...
The security of any general aggregate signature scheme in this new multi-user setting reduces to its security in the original chosen-key setting with a tightness loss of the number of users. ...
doi:10.1007/s12095-017-0253-6
fatcat:dbrpfrcpevc6pa4ako66ody3hu
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme
2008
Journal of Communications
In the threshold-server assisted signature scheme, the generation of a valid signature needs the cooperation of the user and a quorum of servers. ...
In this paper, we discuss a problem of how to construct forward secure single-server, multi-server and thresholdserver assisted signature schemes using Bellare-Miner Scheme and propose three signature ...
In the last scheme, any generation of a valid signature needs the cooperation of the user and a quorum of servers. ...
doi:10.4304/jcm.3.7.28-35
fatcat:t2ygf6cevjg7bb6kj6pwbw6cti
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group
2017
KSII Transactions on Internet and Information Systems
A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature ...
In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. ...
Chang [18] proposed an ID-based multi-signer universal designated multi-verifier signature, which allows a set of multi-signer to cooperatively generate a signature and designate a set of multi-verifier ...
doi:10.3837/tiis.2017.11.025
fatcat:xgjomyekhvbexo24lx5af62szq
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting
[chapter]
2010
Lecture Notes in Computer Science
In [11] , the security of a verifiably committed signature scheme (equivalently, an optimistic fair exchange protocol) in the single-user setting consists of three aspects: security against the signer, ...
This paper investigates the conditions under which the security of optimistic fair exchange in the single-user setting is preserved in the multi-user setting. ...
They defined the security notions of verifiably committed signature in the multi-user setting and proposed a concrete construction of multi-user secure stand-alone and setup-free verifiably committed signature ...
doi:10.1007/978-3-642-13013-7_8
fatcat:rcvt3xpe5zgmhghb6h4qfne7bq
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
[article]
2009
arXiv
pre-print
This paper proposes a multi signcryption scheme in which no pairing is computed on the signcryption stage and the signatures can be verified publicly. ...
Multi-signcryption is used when different senders wants to authenticate a single message without revealing it. ...
In 1989, Boyed [6] defined multi signature scheme the scenario where more than one user authenticate a single message in such a way that a verifier verify only a single compact signature on that message ...
arXiv:0909.1412v1
fatcat:hcyttrzkxfcrxlnjco73mdn6xu
Signcryption Scheme Based on SCHNORR Digital Signature
2012
International Journal of Peer to Peer Networks
The two-users security model is presented in the sixth part and multi-user security model is presented in the seventh part. ...
The stepby-step implementation of the Schnorr Signcryption scheme in a source code program is reflected in the fourth part. ...
This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually ...
doi:10.5121/ijp2p.2012.3101
fatcat:mfloitn4krbxbekofasg3b5qx4
Optimistic Fair Exchange with Strong Resolution-Ambiguity
2011
IEEE Journal on Selected Areas in Communications
We prove that in the certified-key model, an OFE protocol is secure in the multi-user setting if it is secure in the single-user setting and has the property of strong resolution-ambiguity. ...
Our result not only simplifies the security analysis of OFE protocols in the multiuser setting but also provides a new approach for the design of multi-user secure OFE protocols. ...
DEFINITIONS OF OFE IN THE MULTI-USER SETTING In this section, we describe the syntax and security definitions of OFE in the multi-user setting [4] .
A. ...
doi:10.1109/jsac.2011.110814
fatcat:eye4nbgbgrggjgpacvwhdjhgrm
A new efficient optimistic fair exchange protocol without random oracles
2011
International Journal of Information Security
In this work, we propose a new construction of OFE from another cryptographic primitive, called time capsule signature. ...
Applying our generic construction to the time capsule signature scheme recently proposed by Libert and Quisquater, we obtain a new concrete and efficient OFE construction secure based on Computational ...
As we consider multi-user setting in this work, we select those schemes proved to be secure in the multi-user setting for comparison in Table 2 . ...
doi:10.1007/s10207-011-0152-3
fatcat:mso42x255fedhffwoo2zxd7mom
Revisiting Optimistic Fair Exchange Based on Ring Signatures
2014
IEEE Transactions on Information Forensics and Security
of unforgeable under an adaptive attack, against a static adversary in the 2-user setting. ...
of unforgeable under an adaptive attack, against a static adversary in the 2-user setting. ...
A. Comparison There are only three efficient OFE schemes that are known to be secure in the multi-user setting and chosen-key model without random oracles. ...
doi:10.1109/tifs.2014.2354986
fatcat:blas76uwb5hs3ar5kzlmdwz3hi
Signcryption scheme based on schnorr digital signature
[article]
2012
arXiv
pre-print
The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. ...
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. ...
This scheme is named Schnorr Signcryption and it implements in a single logical step both public key encryption and digital signature, offering less costs as using these two cryptographic functions individually ...
arXiv:1202.1663v1
fatcat:cfngrkm4dzdlvhsefek4k6kmam
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs
2021
IEEE Access
The proposed forward secure signature scheme can aggregate signatures generated by multiple users as well as a single user. ...
In this paper, we propose a new forward secure aggregate signature scheme utilizing recursive zk-SNARKs (zero knowledge Succinct Non-interactive ARguments of Knowledge). ...
FORWARD SECURE MULTI-USER AGGREGATE SIGNATURES We extend the forward secure signature notion to a forward secure multi-user aggregate signature that supports the aggregation of multi-user signatures whose ...
doi:10.1109/access.2021.3093925
fatcat:6nmddj5jsnfdhppl43labljyqy
Ambiguous optimistic fair exchange: Definition and constructions
2015
Theoretical Computer Science
We present a formal security model for AOFE in the multi-user setting and chosen-key model, and propose a generic construction of AOFE that is provably secure under our model. ...
We present a formal security model for AOFE in the multi-user setting and chosen-key model, and propose a generic construction of AOFE that is provably secure under our model. ...
$ A preliminary version of this paper appeared in Asiacrypt 2008 [25] . This is a vastly extended version. This work is supported by the National Natural ...
doi:10.1016/j.tcs.2014.09.043
fatcat:gbbutkwh3vg6dhcziyzwk6evjm
Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud
2016
International Journal of Computer Applications
So the motivation of this paper is to propose a secure data reading and sharing scheme using above mentioned scheme. ...
To overcome these issues, concept of ring signature has been introduced for data sharing amongst large number of users. Ring signatures are used to provide user's anonymity and signer's privacy. ...
The ring signature allows a user from a set of possible signers, to convince the verifier that the author of the signature belongs to the set of group of authenticated signers but identity of the author ...
doi:10.5120/ijca2016909894
fatcat:fja3osi23nexznr3ooe3shabmm
Analysis of attribute-based cryptographic techniques and their application to protect cloud services
2019
Transactions on Emerging Telecommunications Technologies
schemes, w.r.t. supported features, namely security, privacy and functional requirements. ...
The loss of user control over their cloud stored data introduced several security and privacy concerns. To address these concerns, cryptographic techniques are widely adopted at the user side. ...
Therefore, the signature is generated according to a set of attributes by a user whose access structure satisfies this set.
Accountability in ABS ABS schemes need to anonymise users identities. ...
doi:10.1002/ett.3667
fatcat:eu7rs5halbefrmbiipbf6t7c7e
New Blind Muti-signature Schemes based on ECDLP
2018
International Journal of Electrical and Computer Engineering (IJECE)
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. ...
The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better ...
considered one of the two signature sets for A (A acts as the signatory), and ( , , ) e r s is the data stored in the release scheme of A. ...
doi:10.11591/ijece.v8i2.pp1074-1083
fatcat:f5o46ccvk5eblokgvabhd2a36m
« Previous
Showing results 1 — 15 out of 31,353 results