# Electronic signature

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2004

Highly Cited

2004

- IACR Cryptology ePrint Archive
- 2004

We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature withâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Public Key Cryptography
- 2003

We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in anyâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- EUROCRYPT
- 2003

This paper provides theoretical foundations for the group signature primitive. We introduce strong, formal definitions for theâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- IEEE Trans. Reliability
- 2002

This paper presents a new signature monitoring technique, CFCSS (Control Flow Checking by Software Signatures); CFCSS is a pureâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- IACR Cryptology ePrint Archive
- 2002

An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from nâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

- IEEE Trans. Geoscience and Remote Sensing
- 2001

Linear spectral mixture analysis (LSMA) is a widely used technique in remote sensing to estimate abundance fractions of materialsâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- IACR Cryptology ePrint Archive
- 1999

We present an RSA threshold signature scheme. The scheme enjoys the following properties: 1. it is unforgeable and robust in theâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- Financial Cryptography
- 1998

In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blindâ€¦Â (More)

Is this relevant?

Highly Cited

1990

Highly Cited

1990

- STOC
- 1990

Much research in theoretical cryptography has been centered around finding the weakest possible cryptographic assumptionsâ€¦Â (More)

Is this relevant?

Highly Cited

1978

Highly Cited

1978

- Commun. ACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal theâ€¦Â (More)

Is this relevant?