๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

The security of the birational permutation signature schemes

โœ Scribed by Don Coppersmith; Jacques Stern; Serge Vaudenay


Publisher
Springer
Year
1997
Tongue
English
Weight
727 KB
Volume
10
Category
Article
ISSN
0933-2790

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


On the security of an identity based mul
โœ Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 208 KB

In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and secur

Some remarks on the security of the iden
โœ Jean Georgiades ๐Ÿ“‚ Article ๐Ÿ“… 1992 ๐Ÿ› Springer ๐ŸŒ English โš– 219 KB

We present in this paper an idea ofhow to reduce the number of possible permutations when trying to solve the permuted kernels problem. We refer to the identification scheme of Shamir [2] and we also show how a dishonest prover can maximize his prospects to pass the test.