Digital Signature Schemes over the Ring Z[e2πi/5]
Abstract
References
Index Terms
- Digital Signature Schemes over the Ring Z[e2πi/5]
Recommendations
Proxy signature schemes based on factoring
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. However, most of existing proxy signature schemes are based on the discrete logarithm problem. In this paper, the author ...
Designated verifier proxy signature scheme without random oracles
In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter can sign messages on behalf of the former, but the validity of the resulting signatures can only be verified by ...
Breaking and repairing trapdoor-free group signature schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In case of later dispute, a designated group manager can revoke the anonymity and identify the originator of a signature. In Asiacrypt2004, Nguyen and ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/8c5091ff-4a73-4365-bd19-89d1058d1188/3331453.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 57Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in