Sciweavers

149 search results - page 4 / 30
» A Scheme for Obtaining a Message from the Digital Multisigna...
Sort
View
IJNSEC
2008
154views more  IJNSEC 2008»
13 years 7 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 24 days ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
PCM
2009
Springer
114views Multimedia» more  PCM 2009»
14 years 3 days ago
Improving a Digital Rights Management Scheme for Video Broadcast
The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli propo...
Yongdong Wu, Feng Bao
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
13 years 7 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 8 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein