Sciweavers

92 search results - page 5 / 19
» Hidden Identity-Based Signatures
Sort
View
ASIACRYPT
2006
Springer
13 years 11 months ago
On the Generic Construction of Identity-Based Signatures with Additional Properties
David Galindo, Javier Herranz, Eike Kiltz
JISE
2008
89views more  JISE 2008»
13 years 7 months ago
Identity-Based Parallel Key-Insulated Signature Without Random Oracles
Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu
CVPR
2010
IEEE
14 years 3 months ago
Scalable Face Image Retrieval with Identity-Based Quantization and Multi-Reference Re-ranking
State-of-the-art image retrieval systems achieve scalability by using bag-of-words representation and textual retrieval methods, but their performance degrades quickly in the face...
Zhong Wu, Qifa Ke, Jian Sun, Heung-Yeung Shum
IEEECIT
2005
IEEE
14 years 1 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
13 years 7 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...