The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks

T Ristenpart, S Yilek - Advances in Cryptology-EUROCRYPT 2007: 26th …, 2007 - Springer
Multiparty signature protocols need protection against rogue-key attacks, made possible
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …

Generalized digital certificate for user authentication and key establishment for secure communications

L Harn, J Ren - IEEE Transactions on Wireless …, 2011 - ieeexplore.ieee.org
Public-key digital certificate has been widely used in public-key infrastructure (PKI) to
provide user public key authentication. However, the public-key digital certificate itself …

Deriving use cases from organizational modeling

VFA Santander, JFB Castro - Proceedings IEEE joint …, 2002 - ieeexplore.ieee.org
Use cases diagrams in the Unified Modeling Language (UML) have been used for capturing
system functional requirements. However, the system development occurs in a context …

A novel ID-based designated verifier signature scheme

J Zhang, J Mao - Information sciences, 2008 - Elsevier
In a designated verifier signature scheme, only the designated verifier can verify the validity
of a signature. This paper studies an Identity-based Strong Designated Verifier Signature …

Attribute-based encryption without key cloning

MJ Hinek, S Jiang, R Safavi-Naini… - … Journal of Applied …, 2012 - inderscienceonline.com
In this work, we consider the problem of key cloning in attribute-based encryption schemes.
We introduce a new type of attribute-based encryption scheme, called token-based attribute …

Asymmetric message franking: Content moderation for metadata-private end-to-end encryption

N Tyagi, P Grubbs, J Len, I Miers… - Advances in Cryptology …, 2019 - Springer
Content moderation is crucial for stopping abusive and harassing messages in online
platforms. Existing moderation mechanisms, such as message franking, require platform …

[PDF][PDF] Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.

SSM Chow, JK Liu, DS Wong - NDSS, 2008 - researchgate.net
For most elections, receipt-freeness is important–voters are unable to prove to others on
how they voted, in order to prevent vote-buying. Many existing receipt-free electronic voting …

An Efficient Aggregate Signature Scheme with Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks

W Yang, J Fan, F Zhang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In healthcare wireless sensor networks (HWSNs), a lot of personal medical data are
collected by wireless sensors. Given that a medical diagnostic analysis heavily relies on …

Cerium doped heavy metal fluoride glasses, a possible alternative for electromagnetic calorimetry

E Auffray, D Bouttet, I Dafinei, J Fay, P Lecoq… - Nuclear Instruments and …, 1996 - Elsevier
The article is an overview of the research activity made in the framework of the Crystal Clear
Collaboration aimed at obtaining scintillating glasses able to fit the constraints imposed for …

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability

Q Huang, G Yang, DS Wong, W Susilo - International Journal of …, 2011 - Springer
Designated verifier signature (DVS) allows a signer to convince a designated verifier that a
signature is generated by the signer without letting the verifier transfer the conviction to …