Sciweavers

1610 search results - page 18 / 322
» Identity Based Multisignatures
Sort
View
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
14 years 2 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater
PCM
2005
Springer
141views Multimedia» more  PCM 2005»
14 years 1 months ago
Automatic Photo Indexing Based on Person Identity
In this paper, we propose a novel approach to automatically index digital home photos based on person identity. A person is identified by his/her face and clothes. The proposed met...
Seungji Yang, Kyong Sok Seo, Sang Kim, Yong Man Ro...
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
HUC
2007
Springer
14 years 2 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
ESCIENCE
2005
IEEE
14 years 2 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson