20 research outputs found

    ID-Based Digital Signatures with Security Enhanced Approach, Journal of Telecommunications and Information Technology, 2009, nr 4

    Get PDF
    In the paper the ID-based digital signatures with signer’s protection in case of the private key compromising is investigated. The proposed protocols have two main ingredients. First is the application of the credential system for the suitable verification key approval. Second is the application of the subliminal channel together with the interactive generation of the secret key, to obtain the increased resistance of the system against the powerful adversary. The particular interest was turned towards the significance of the deniable encryption in creation of the corresponding protocols

    On oracle factoring of integers

    Full text link
    We present an oracle factorisation algorithm which finds a nontrivial factor of almost all squarefree positive integers nn based on the knowledge of the number of points on certain elliptic curves in residue rings modulo nn

    Multi-threshold signature, Journal of Telecommunications and Information Technology, 2008, nr 1

    Get PDF
    The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature. This scheme protects the anonymity of signers in a way the group signature does – in exceptional circumstances the identities of signers may be revealed. Due to the new party – completer, in our scheme the threshold size may vary together with the message to be signed. The presented scheme is based on the RSA signature standard, however other signature standards might be applied to it as well

    Simple Dynamic Threshold Decryption Based on CRT and RSA, Journal of Telecommunications and Information Technology, 2009, nr 2

    Get PDF
    In the paper we present a simple threshold decryption system based on the RSA cryptosystem. Our model avoids the application of the Shamir secret sharing protocol and is based only on the Chinese reminder theorem. The flexibility in the threshold level is attained due to the suitable preparation of the input data. The second part of the article describes a modification of the basic model, which admits the sender’s impact on the choice of the real receiver’s group

    ID-based, proxy, threshold signature scheme

    Get PDF
    We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed

    Cubic norms represented by quadratic sequences

    No full text

    Bilinear form of the remainder term in the Rosser-Iwaniec sieve of dimension ϰ ∈ (1/2,1)

    No full text
    corecore