Electronic signature

Known as: Esignature, Electronic signatures, E-signature 
An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper provides theoretical foundations for the group signature primitive. We introduce strong, formal definitions for the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents a new signature monitoring technique, CFCSS (Control Flow Checking by Software Signatures); CFCSS is a pure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
2002
Highly Cited
2002
An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Linear spectral mixture analysis (LSMA) is a widely used technique in remote sensing to estimate abundance fractions of materials… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present an RSA threshold signature scheme. The scheme enjoys the following properties: 1. it is unforgeable and robust in the… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Much research in theoretical cryptography has been centered around finding the weakest possible cryptographic assumptions… (More)
Is this relevant?
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… (More)
Is this relevant?