Applied Batch Cryptography

نویسندگان

  • Christopher John Pavlovski
  • Christopher J. Pavlovski
چکیده

. In S. Goldwasser, editor, Advances in Cryptology − CRYPTO ‘88, Springer-Verlag, Vol. 403, LNCS, pp.319-327, 1988.[CP92] D. Chaum and T. Pedersen. Wallet databases with observers (extendedabstract). In E. Brickell, editor, Advances in Cryptology − CRYPTO ‘92, Springer-Verlag, Vol. 740, LNCS, pp.89-105, 1992.[CH91] D. Chaum, and E. Van Heyst. Group Signatures. In D. Davies, editor,Advances in Cryptology − EUROCRYPT ‘91, Springer-Verlag, Vol. 547, LNCS, pp.257-265, 1991.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Batch Verification and Finding Invalid Signatures in a Group Signature Scheme

Batch cryptography has been developed into two main branches batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by ...

متن کامل

A Method of Finding Bad Signatures in an RSA-Type Batch Verification

Batch cryptography has been developed into two main branches – batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially b...

متن کامل

Investigating Methods of Kleptography

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

متن کامل

Detachable Electronic Coins

We propose a non-divisible electronic cash system that combines the restrictive blind signature technique and a batch signature scheme based upon the binary tree structure. Contemporary electronic cash solutions rely on the divisibility paradigm to achieve significant computational savings, and such techniques are considered to be the most efficient. We demonstrate an alternative approach that ...

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002