In this paper we introduce the concept of an aggregate signature, present security models for such signatures, and give several applications for aggregate.
In this paper we introduce the concept of an aggregate signature scheme, present security models for such signatures, and give several applications for ...
In this pa- per we introduce the concept of an aggregate signature, present security models for such signatures, and give several applications for aggregate.
People also ask
Aggregate signatures are useful for reducing the size of certificate chains (by aggregating all signatures in the chain) and for reducing message size in secure ...
The document proposes an aggregate signature scheme that allows combining multiple signatures on different messages from different users into a single short ...
We discuss the use of bilinear maps to construct short signatures on elliptic curves, which is used as a foundation for the construction of compressed and ...
Boneh, D., Gentry, C., Lynn, B. and Shacham, H. (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology, EUROCRYPT, 2656 ...
In this paper, we first propose an identity (ID)-based signature scheme from bilinear pairing and show that such a scheme can be used to generate an ID-based ...
Boneh, D., Gentry, C., Lynn, B. and Shacham, H. (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: International Conference on the ...
We also show that aggregate signatures give rise to verifiably encrypted signatures. Such signatures enable the verifier to test that a given ciphertext C is ...