Committal deniable signatures over elliptic curves
In this paper, a new denaible signatue scheme- committal deniable signature scheme is proposed. This scheme has been constructed using bilinear pairings over elliptic curves.
| Main Authors: | Han, Song, Liu, Wan-Quan |
|---|---|
| Other Authors: | Hassanein, H. |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2004
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/19409 |
Similar Items
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
by: Reed, Sean
Published: (2017)
by: Reed, Sean
Published: (2017)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Creativity in teaching: what can teachers learn from artists?
by: Hall, Christine, et al.
Published: (2016)
by: Hall, Christine, et al.
Published: (2016)
Genome-wide identification of signatures of positive selection in African admixed zebu cattle
by: Bahbahani, Hussain
Published: (2015)
by: Bahbahani, Hussain
Published: (2015)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Signatures of selection and introgression in the genus Gallus
by: Lawal, Raman Akinyanju
Published: (2018)
by: Lawal, Raman Akinyanju
Published: (2018)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Directional fractal signature analysis of trabecular bone: evaluation of different methods to detect early osteoarthritis in knee radiographs
by: Wolski, Marcin, et al.
Published: (2009)
by: Wolski, Marcin, et al.
Published: (2009)
Identification by PCR signature-tagged mutagenesis of attenuated Salmonella Pullorum mutants and corresponding genes in a chicken embryo model
by: Geng, Shizhong, et al.
Published: (2017)
by: Geng, Shizhong, et al.
Published: (2017)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
‘Everyone can imagine their own Gellert’: the democratic artist and ‘inclusion’ in primary and nursery classrooms
by: Thomson, Pat, et al.
Published: (2015)
by: Thomson, Pat, et al.
Published: (2015)
A three-step classification framework to handle complex data distribution for radar UAV detection
by: Ren, Jianfeng, et al.
Published: (2020)
by: Ren, Jianfeng, et al.
Published: (2020)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Metabolic signature in stage A/B heart failure: A study in asymptomatic Type 2 Diabetes
by: Brady, Emer M.
Published: (2024)
by: Brady, Emer M.
Published: (2024)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Low-dose salinomycin induces anti-leukemic responses in AML and MLL
by: Roulston, Gary D.R., et al.
Published: (2016)
by: Roulston, Gary D.R., et al.
Published: (2016)
In-process measurement and monitoring of a polymer laser sintering powder bed with fringe projection
by: Southon, Nicholas, et al.
Published: (2018)
by: Southon, Nicholas, et al.
Published: (2018)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
Aquifers and ferric spring deposits south of Miri, Sarawak: impact on facies characterisation of coastal sediments
by: Kessler, L, et al.
Published: (2008)
by: Kessler, L, et al.
Published: (2008)
Similar Items
-
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004) -
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005) -
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005) -
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006) -
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)