Bonn-Aachen International Center for Information Technology

Displaying 1-2 of 2 results

  • White Papers // Jul 2009

    On the Security of a Proxy Blind Signature Scheme Over Braid Groups

    A proxy blind signature scheme is the combination of proxy signature and blind signature scheme. In 2009,Verma proposed a proxy blind signature scheme over braid groups. Verma claimed that the proposed scheme is secure against all possible security lapses and also satisfy all essential security attributes. This paper analyzes Verma's...

    Provided By Bonn-Aachen International Center for Information Technology

  • White Papers // Jul 2009

    Toward a Generic Construction of Convertible Undeniable Signatures From Pairing-Based Signatures

    Undeniable signatures were proposed to limit the verification property of ordinary digital signatures. In fact, the verification of such signatures cannot be attained without the help of the signer, via the confirmation/denial protocols. Later, the concept was refined to give the possibility of converting a selected signature into an ordinary...

    Provided By Bonn-Aachen International Center for Information Technology

  • White Papers // Jul 2009

    On the Security of a Proxy Blind Signature Scheme Over Braid Groups

    A proxy blind signature scheme is the combination of proxy signature and blind signature scheme. In 2009,Verma proposed a proxy blind signature scheme over braid groups. Verma claimed that the proposed scheme is secure against all possible security lapses and also satisfy all essential security attributes. This paper analyzes Verma's...

    Provided By Bonn-Aachen International Center for Information Technology

  • White Papers // Jul 2009

    Toward a Generic Construction of Convertible Undeniable Signatures From Pairing-Based Signatures

    Undeniable signatures were proposed to limit the verification property of ordinary digital signatures. In fact, the verification of such signatures cannot be attained without the help of the signer, via the confirmation/denial protocols. Later, the concept was refined to give the possibility of converting a selected signature into an ordinary...

    Provided By Bonn-Aachen International Center for Information Technology