Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Faculty of Engineering and Information Sciences - Papers: Part A

2015

Identity

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo Jan 2015

Identity-Based Quotable Ring Signature, Kefeng Wang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily …


An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo Jan 2015

An Efficient Variant Of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing, Ibrahim Elashry, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo Jan 2015

An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings And Its Variants, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed byTiwari et al. in 2012. First, we review identity-based (multi)-proxy multi-signature schemes without bilinear pairings and show that unfortunately, they …