An efficient identity-based batch verification scheme for vehicular sensor networks
With the adoption of state-of-the-art telecommunication technologies for sensing and
collecting traffic related information, Vehicular Sensor Networks (VSNs) have emerged as a …
collecting traffic related information, Vehicular Sensor Networks (VSNs) have emerged as a …
[LIVRE][B] Advances in elliptic curve cryptography
IF Blake, G Seroussi, NP Smart - 2005 - books.google.com
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999
there has been tremendous progress in the field. In some topics, particularly point counting …
there has been tremendous progress in the field. In some topics, particularly point counting …
Active harmony: Towards automated performance tuning
C Tapus, IH Chung… - SC'02: Proceedings of the …, 2002 - ieeexplore.ieee.org
In this paper, we present the Active Harmony automated runtime tuning system. We describe
the interface used by programs to make applications tunable. We present the Library …
the interface used by programs to make applications tunable. We present the Library …
Pi: A practical incentive protocol for delay tolerant networks
Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed
connectivity, typically low frequency of encounters between DTN nodes and long …
connectivity, typically low frequency of encounters between DTN nodes and long …
On batch verification with group testing for vehicular communications
In this paper, an efficient identity-based batch signature verification scheme is proposed for
vehicular communications. With the proposed scheme, vehicles can verify a batch of …
vehicular communications. With the proposed scheme, vehicles can verify a batch of …
Efficient blind and partially blind signatures without random oracles
T Okamoto - Theory of Cryptography Conference, 2006 - Springer
This paper proposes a new efficient signature scheme from bilinear maps that is secure in
the standard model (ie, without the random oracle model). Our signature scheme is more …
the standard model (ie, without the random oracle model). Our signature scheme is more …
Pairing-based cryptographic protocols: A survey
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves
have recently been found applications in design of cryptographic protocols. In this survey …
have recently been found applications in design of cryptographic protocols. In this survey …
Batch verification of short signatures
With computer networks spreading into a variety of new environments, the need to
authenticate and secure communication grows. Many of these new environments have …
authenticate and secure communication grows. Many of these new environments have …
The Abe-Okamoto partially blind signature scheme revisited
Partially blind signatures, an extension of ordinary blind signatures, are a primitive with wide
applications in e-cash and electronic voting. One of the most efficient schemes to date is the …
applications in e-cash and electronic voting. One of the most efficient schemes to date is the …
Two improved partially blind signature schemes from bilinear pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the
signer can neither learn the messages he/she sign nor the signatures the recipients obtain …
signer can neither learn the messages he/she sign nor the signatures the recipients obtain …