Sciweavers

79 search results - page 4 / 16
» A Biometric Identity Based Signature Scheme
Sort
View
ATC
2007
Springer
14 years 5 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 9 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
IEEECIT
2005
IEEE
14 years 4 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
ICB
2007
Springer
185views Biometrics» more  ICB 2007»
14 years 5 months ago
Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures
We present a general biometric hash generation scheme based on vector quantization of multiple feature subsets selected with genetic optimization. The quantization of subsets overc...
Manuel R. Freire, Julian Fiérrez-Aguilar, J...
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
14 years 4 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen