Sciweavers

1610 search results - page 22 / 322
» Identity Based Multisignatures
Sort
View
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
14 years 5 days ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
ICPR
2010
IEEE
14 years 2 months ago
Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference
While existing face recognition systems based on local features are robust to issues such as misalignment, they can exhibit accuracy degradation when comparing images of differing...
Yongkang Wong, Conrad Sanderson, Sandra Mau, Brian...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 2 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
14 years 12 days ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
CVPR
2010
IEEE
14 years 4 months ago
Scalable Face Image Retrieval with Identity-Based Quantization and Multi-Reference Re-ranking
State-of-the-art image retrieval systems achieve scalability by using bag-of-words representation and textual retrieval methods, but their performance degrades quickly in the face...
Zhong Wu, Qifa Ke, Jian Sun, Heung-Yeung Shum