A New Public Key Signature Scheme Based on Multivariate Polynomials

Author(s):  
Feng Yuan ◽  
Shangwei Zhao ◽  
Haiwen Ou ◽  
Shengwei Xu
2019 ◽  
Vol 58 (10) ◽  
pp. 3282-3294 ◽  
Author(s):  
Xiangjun Xin ◽  
Zhuo Wang ◽  
Qianqian He ◽  
Qinglan Yang ◽  
Fagen Li

2021 ◽  
Vol 1897 (1) ◽  
pp. 012045
Author(s):  
Karrar Taher R. Aljamaly ◽  
Ruma Kareem K. Ajeena

1989 ◽  
Vol 25 (1) ◽  
pp. 64-65
Author(s):  
V. Varadharajan

1990 ◽  
Vol 21 (1) ◽  
pp. 205-215
Author(s):  
SAAD M. KALlPHA ◽  
JAFAR WADI ABDUL SADA ◽  
HUSSAIN ALI HUSSAIN

2013 ◽  
Vol 380-384 ◽  
pp. 2435-2438 ◽  
Author(s):  
Shu Rong Feng ◽  
Jiao Mo ◽  
Hua Zhang ◽  
Zheng Ping Jin

Certificateless short signature schemes can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However, all existing certificateless short signature schemes only proven secure against a normal adversary which can only obtain the valid signature for the original public key rather than a super adversary which can obtain the valid signature for the replaced public key. Recently, Fan et al. proposed a certificateless short signature scheme which is very efficient, but we found it is still cannot against super adversary. In this paper, we first analysis their scheme, and then present an improved scheme which can against super adversaries. Furthermore, our scheme can provide both the strongest security level and the shortest signature size compared the existed provably secure certificateless short signature scheme.


2013 ◽  
Vol 756-759 ◽  
pp. 1339-1343
Author(s):  
Yu Lian Shang ◽  
Xiu Juan Wang ◽  
Yu Juan Li ◽  
Yu Fei Zhang

Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k,l) joint verification for (t,n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the informationmis transmitted to a particular verifier company, and then the signature is verified through the cooperation ofkones from the verifier company withlmembers, so as to realize a directional transmission between different companies. Finally, the application examples of the company encryption communication system, the generating polynomial of company private key and public key were given. The security of this scheme is based on Shamir threshold scheme and Elliptic Curve system, and due to the advantages of Elliptic Curve, the scheme enjoys wider application in practice.


Sign in / Sign up

Export Citation Format

Share Document