Sciweavers

42 search results - page 7 / 9
» A cryptosystem based on palmprint feature
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 2 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
14 years 20 days ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 9 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
ICIP
2006
IEEE
14 years 10 months ago
A Video Fingerprint Based on Visual Digest and Local Fingerprints
A fingerprinting design extracts discriminating features, called fingerprints. The extracted features are unique and specific to each image/video. The visual hash is usually a glo...
Ayoub Massoudi, Bertrand Chupeau, Claire-Hé...
ICPR
2008
IEEE
14 years 3 months ago
Topological structure-based alignment for fingerprint Fuzzy Vault
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Jianjie Li, Xin Yang, Jie Tian, Peng Shi, Peng Li