Sciweavers

1610 search results - page 15 / 322
» Identity Based Multisignatures
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 8 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
FLAIRS
2000
13 years 9 months ago
Deriving Summaries Through an Identity-Based Approach
The existence of large datasets requires methods for producing simpler or summarized views of data. Typical approaches to summarization based on statistics do not capture complete...
Kathleen Hornsby
FC
2005
Springer
171views Cryptology» more  FC 2005»
14 years 2 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
ETRICS
2006
14 years 3 days ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
CSFW
2003
IEEE
14 years 1 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla