Movatterモバイル変換


[0]ホーム

URL:


Fischlin, 2003 - Google Patents

Progressive verification: The case of message authentication

Fischlin, 2003

ViewPDF
Document ID
9899886319056411514
Author
Fischlin M
Publication year
Publication venue
International Conference on Cryptology in India

External Links

Snippet

We introduce the concept of progressive verification for cryptographic primitives like message authentication codes, signatures and identification. This principle overcomes the traditional property that the verifier remains oblivious about the validity of the verified …
Continue reading atwww.researchgate.net (PDF) (other versions)

Similar Documents

PublicationPublication DateTitle
CA1321649C (en)Method and system for authentication
US6701434B1 (en)Efficient hybrid public key signature scheme
Boldyreva et al.Secure proxy signature schemes for delegation of signing rights
US7698736B2 (en)Secure delegation using public key authentication
US8667283B2 (en)Soft message signing
US6826687B1 (en)Commitments in signatures
Liu et al.Two-pass authenticated key exchange with explicit authentication and tight security
US20110271109A1 (en)Systems and methods of remote device authentication
CN114117547B (en)SM9 digital signature acceleration generation method and digital signature acceleration verification method based on pre-calculation table
EP0374225B1 (en)Method and device for authentication
Drake et al.Hash-based multi-signatures for post-quantum ethereum
CN115694822A (en) Verification method, device and system, equipment and medium based on zero-knowledge proof
Eaton et al.Security analysis of signature schemes with key blinding
CN116170228A (en) Authentication method, device, storage medium and equipment for terminal identification equipment
Adjedj et al.Two-Round 2PC ECDSA at the Cost of 1 OLE
CN112184245B (en)Transaction identity confirmation method and device for cross-region block chain
EndignouxDesign and implementation of a post-quantum hash-based cryptographic signature scheme
FischlinProgressive verification: The case of message authentication
Fischlin et al.Post-quantum Security for the Extended Access Control Protocol
PageThe application of hash chains and hash structures to cryptography
Wang et al.Security remarks on a convertible nominative signature scheme
Mehjabin et al.PAMA: PUF-based Aggregated Multi-hop Attestation Protocol for IoT
KatzDigital signatures: Background and definitions
CN114640475B (en)Decentralized identity authentication method and device, computer equipment and storage medium
Biswas et al.Multi-key fully-homomorphic aggregate MAC for arithmetic circuits

[8]ページ先頭

©2009-2025 Movatter.jp