RSAES-OAEP: improved encryption/decryption scheme。 RSASSA-PSS: improved probabilistic signature scheme with appendix; EMSA-PSS: encoding method for signature appendix, probabilistic signature scheme. In cryptography, Optimal Asymmetric Encryption Padding (OAEP) is a padding scheme often used together with...
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644–654. Google Scholar Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on c...
In this blog, we’ll discuss what is Digital Signature in Cryptography, how it is created, the digital signature algorithms, and the various types of digital signature.
The security of the most digital signature schemes widely use in practice is based on the two difficult problems, viz; the problem of factoring integers (The RSA scheme) and the problem of finding discrete logarithms over finite fields (The ElGamal scheme). The proposed works in this thesis ...
CA Melchor,PL Cayrel,P Gaborit - International Workshop on Post-quantum Cryptography 被引量: 131发表: 2008年 Certificateless Threshold Ring Signature We propose a t-out-of- n Certificateless Threshold Ring Signature (CL-TRS) scheme and prove its security under a new and stronger set of securi...
A signature scheme is one of the important primitives in modern cryptography, which may offer functionalities of user identification, non-repudiation, and ... TT Tsai,YM Tseng,TY Wu - 《Security & Communication Networks》 被引量: 32发表: 2013年 A Directed Signature Scheme Based on RSA Assumpti...
A Provably Secure Ring Signature Scheme in Certificateless Cryptography Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her ident... Z Lei,F Zhang,W Wei - Provable Security, First International ...
In this paper, we propose a new signature scheme based on a punctured Reed--Muller (RM) code with random insertion, which improves the Goppa code-based signature scheme developed by Courtois, Finiasz, and Sendrier (CFS). The CFS signature scheme has certain drawbacks in terms of scaling of...
We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) who also showed that it hold
[Lecture Notes in Computer Science] Advances in Cryptology Volume 196 || Identity-Based Cryptosystems and Signature Schemes GR Blakley,D Chaum 被引量: 0发表: 1985年 Identity Based Cryptosystems and Signature Scheme. In G. R. Blakley, and David Chaum (Eds.) A Shamir 被引量: 817发表: 1984...