Sciweavers

149 search results - page 3 / 30
» A Scheme for Obtaining a Message from the Digital Multisigna...
Sort
View
JCP
2007
88views more  JCP 2007»
13 years 6 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
DCC
2003
IEEE
14 years 6 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 8 days ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
ASIACRYPT
2011
Springer
12 years 6 months ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz
ICPADS
2005
IEEE
14 years 14 days ago
A Distributed IP Address Assignment Scheme for Ad Hoc Networks
In this paper, we present a scheme to assign IP address to each newly-joined node. Some nodes are assigned as coordinators, and are responsible for assigning an IP address to a ne...
Jang-Ping Sheu, Shin-Chih Tu, Li-Hsiang Chan