The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper the authors analyze the problems and shortcomings of the existing diploma anti-forgery systems, and propose a new diploma anti-forgery system based on digital identities. A digital identity is produced through the JUNA lightweight digital signature scheme. It hide the private key of a university, the ID number of a student, the graduating date etc, consists of only 16 alphanumeric characters,...
The concept of the multi-signature was first proposed by Itakura and Nakamura, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature. After that, a lot of multi-signature schemes were proposed, but almost all of the multi-signature schemes are either sequence multi-signature or broadcasting multi-signature, but a lot of examples...
The proxy multi-signature is a very useful tool, which allows multiple signers to generate in a collaborative and simultaneous, and if a signer needs to delegate his signing capability to other signer, then the proxy signers can sign on behalf of an original signer. The paper proposed a new proxy multi-signature scheme, which the computation complicacy of the signature algorithm and the verification...
With the rapid development of Internet, e-mail authentication becomes more and more important. However, many existing e-mail authentication protocols are not secure enough. In 2005, Sun et al. proposed two e-mail protocols and claimed that can provide perfect forward secrecy. In 2007, Raphael showed the weaknesses of the two e-mail protocols.The first protocol can??t securely against unknown key-share...
The paper analyzed the security threats and system flaws of present proxy authorization signatures, and a forward secure proxy authorization signature scheme with conditionally anonymity based on ECC (elliptic curves cryptosystem) was presented. The identity blinding and probabilistic encryption algorithm of the scheme enable the proxy signer to be conditionally anonymous for secrecy protection, and...
Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one. A certificateless aggregate signature scheme that is provably secure in our model is also presented. The security of our...
We propose a new aggregate signature scheme from bilinear pairings. It requires constant pairing operations in the verification and the size of aggregate signature is independent of the number of signers. In the public key infrastructure (PKI) setting, it is the first aggregate signature scheme with these properties. Hence, it is very practical in the environments with computational power limited...
As a special digital signature, a group signature scheme allows a group member to sign message on behalf of the group in an anonymous and unlinkability way. In case of a dispute, the group manager can reveal the actual identity of signer. Anonymity and unlinkability are basic properties of group signature, which is distinguished from other signature schemes. Recently, based on identity cryptology,...
Remote user authentication is suited to solve the privacy and security problems for the single server architecture environment. With the rapid development of Internet service, more and more network architectures are used in multi-server environments. In this paper, a user authentication scheme for multi-server environment is presented. The proposed scheme is based on bilinear pairings. Moreover, it...
A fair exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item or neither party does. In this paper, we propose a key-exposure-free chameleon hashing scheme based on the discrete logarithm assumption, and prove that it enjoys all advantages of previous schemes: collision resistant, semantic security, message hiding and key exposure freeness...
This paper introduces a new digital signature primitive that allows a proxy signer to sign messages on behalf of the original signer, in a way that do not allow the recipient of the signature to disclose the contents of the signed information to any third party without the proxy signer's consent. The above primitive, called proxy chameleon signature enjoys all the attributes in the normal proxy signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.