RF Sign: : Signature Anticounterfeiting Real-Time Monitoring System Based on Single Tag
Abstract
References
Recommendations
Provably secure encrypt-then-sign composition in hybrid signcryption
ICISC'02: Proceedings of the 5th international conference on Information security and cryptologyTo make authenticated encryption which provides confidentiality and authenticity of a message simultaneously, a signcryption scheme uses asymmetric primitives, such as an asymmetric encryption scheme for confidentiality and a signature scheme for ...
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
ProvSec 2015: Proceedings of the 9th International Conference on Provable Security - Volume 9451A popular methodology of designing cryptosystems with practical efficiency is to give a security proof in the random oracle RO model. The work of Fischlin and Fleischhacker Eurocryptï '13 investigated the case of Schnorr signature and generally, Fiat-...
How to sign given any trapdoor function
STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computingWe present a digital signature scheme which combines high security with the property of being based on a very general assumption: the existence of trapdoor permutations. Previous signature schemes with comparable levels of security were based on ...
Comments
Information & Contributors
Information
Published In
Publisher
John Wiley and Sons Ltd.
United Kingdom
Publication History
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0