scispace - formally typeset
Open AccessBook ChapterDOI

Short Signatures from the Weil Pairing

TLDR
A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Abstract
We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves. The signature length is half the size of a DSA signature for a similar level of security. Our short signature scheme is designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks

TL;DR: The proposed EDR protocol improves the safety levels in VANETs as it diminishes the revocation vulnerability window existing in conventional certificate revocation lists (CRLs).
Proceedings ArticleDOI

Efficient Group Signature Scheme Supporting Batch Verification for Securing Vehicular Networks

TL;DR: The proposed scheme can mitigate the effect of the heavy security overhead by batch group signature verification by enabling vehicles to verify a large number of messages in a timely manner, and improves the system performance in terms of the message loss ratio.
Proceedings ArticleDOI

Revocation games in ephemeral networks

TL;DR: This paper defines a game-theoretic model to analyze the various local revocation strategies and establishes and proves the conditions leading to subgame-perfect equilibria, and derives the optimal parameters for voting-based schemes.
Posted ContentDOI

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

TL;DR: A ring signature is a simplified group signature without any manager. as mentioned in this paper proposed a ring signature scheme based on RSA cryptosystem and certificate based public key setting, which is more efficient than existing ring signature schemes.
Journal ArticleDOI

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage

TL;DR: This paper formalizes the system model and the security model for this new primitive, and describes a concrete construction of attribute-based cloud data integrity auditing protocol, which offers desirable properties namely attribute privacy-preserving and collusion-resistance.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book

The Arithmetic of Elliptic Curves

TL;DR: It is shown here how Elliptic Curves over Finite Fields, Local Fields, and Global Fields affect the geometry of the elliptic curves.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.