Sciweavers

963 search results - page 17 / 193
» Conditional Digital Signatures
Sort
View
MTA
2007
82views more  MTA 2007»
13 years 8 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
ASIACRYPT
2011
Springer
12 years 8 months ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
14 years 20 days ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
14 years 3 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi
ITC
1997
IEEE
60views Hardware» more  ITC 1997»
14 years 26 days ago
Current Signatures: Application
Analysis of IC technology trends indicates that Iddq testing may be approaching its limits of applicability. The new concept of the current signature may expand this limit under t...
Anne E. Gattiker, Wojciech Maly