Sciweavers

1610 search results - page 5 / 322
» Identity Based Multisignatures
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 5 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
13 years 4 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 4 months ago
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable...
Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen
JAIR
2011
88views more  JAIR 2011»
12 years 10 months ago
From "Identical" to "Similar": Fusing Retrieved Lists Based on Inter-Document Similarities
We present a novel approach to fusing document lists that are retrieved in response to a query. Our approach is based on utilizing information induced from inter-document similarit...
Anna Khudyak Kozorovitzky, Oren Kurland
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
11 years 9 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert