Sciweavers

284 search results - page 36 / 57
» A New Key-Insulated Signature Scheme
Sort
View
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 9 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
ICICS
2003
Springer
14 years 2 months ago
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
In this paper, we propose a new method for hiding a signature image in the host image. We encode the signature image by a balanced two-description subband coder and embed the descr...
Mohsen Ashourian, Yo-Sung Ho
ICIP
2006
IEEE
14 years 11 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
EUROCRYPT
1998
Springer
14 years 1 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 2 months ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia