Sciweavers

625 search results - page 25 / 125
» Generalized Ring Signatures
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
Signature Schemes with Bounded Leakage Resilience
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Jonathan Katz, Vinod Vaikuntanathan
EUROCRYPT
2004
Springer
14 years 27 days ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen
ASIACRYPT
2001
Springer
14 years 16 hour ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
CIVR
2010
Springer
295views Image Analysis» more  CIVR 2010»
13 years 11 months ago
Signature Quadratic Form Distance
The Signature Quadratic Form Distance is an adaptive similarity measure for flexible content-based feature representations of multimedia data. In this paper, we present a deep su...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
CSL
2010
Springer
13 years 7 months ago
Signature Extensions Preserve Termination - An Alternative Proof via Dependency Pairs
Abstract. We give the first mechanized proof of the fact that for showing termination of a term rewrite system, we may restrict to well-formed terms using just the function symbols...
Christian Sternagel, René Thiemann