15 research outputs found
A comparison on the security notions of obfuscation for different signature-related schemes.
<p>Acronyms used in the above table are explained as follows</p><p>• Dependent Oracle (DO)</p><p>• Restricted Dependent Oracle (RDO)</p><p>• Existential Unforgeability (EU)</p><p>• Encrypted Blind Signature (EBS)</p><p>• Encrypted Verifiably Encrypted Signatures (EVES)</p><p>A comparison on the security notions of obfuscation for different signature-related schemes.</p
Security notions of group signature schemes.
<p>Security notions of group signature schemes.</p
An application in a privacy-preserving emergency call system based on mobile social network.
<p>An application in a privacy-preserving emergency call system based on mobile social network.</p
Some of the scenarios that Definition 3 should be used.
<p>Some of the scenarios that Definition 3 should be used.</p