搜索结果: 1-15 共查到“军队指挥学 aggregate signatures”相关记录19条 . 查询时间(0.09 秒)
Fast Authentication from Aggregate Signatures with Improved Security
Authentication Digital signatures Universal forgery
2018/11/30
An attempt to derive signer-efficient digital signatures from aggregate signatures was made in a signature scheme referred to as Structure-free Compact Rapid Authentication (SCRA) (IEEE TIFS 2017). In...
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Aggregate signatures trapdoor permutations ideal cipher model
2018/1/19
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Fault-Tolerant Aggregate Signatures
Aggregate Signatures Fault-Tolerance Cover-free Family
2016/1/27
Aggregate signature schemes allow for the creation of a short
aggregate of multiple signatures. This feature leads to significant reductions
of bandwidth and storage space in sensor networks, secure...
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
full domain hash identity-based aggregate signatures
2014/3/11
In this work, we explore building constructions with full domain hash structure, but with standard model proofs that do not employ the random oracle heuristic. The launching point for our results will...
Sequential aggregate signature (SAS) is a special type of public-key signature that allows a signer to add his signature into a previous aggregate signature in sequential order. In this case, since ma...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature Full Aggregation
2012/6/14
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
public-key cryptography / Identity Based Deterministic Signature Aggregate Signature Full Aggregation Random Oracle Model, Provable Security
2012/3/20
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
public-key cryptography / aggregate signatures RSA BGPsec
2012/3/28
Sequential aggregate signature schemes allow n signers, in order, to sign a message each, at a lower total cost than the cost of n individual signatures. We present a sequential aggregate signature sc...
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
Identity Based Deterministic Signature Aggregate Signature
2012/8/28
The revolutionary impact offered by identity based cryptography is phenomenal. This novel mechanism was first coined by Adi Shamir in 1984. Since then, several identity based signature schemes were re...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
2012/3/28
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
2011/6/8
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
Identity Based Dererministic Signature Aggregate Signature Full Aggregation Random Oracle Model Provable Security
2010/9/26
Fully aggregateable identity based signature schemes without prior communication between the signing parties is an interesting issue in identity based cryptography. On this front, we identify that det...