Sciweavers

1094 search results - page 40 / 219
» List signature schemes
Sort
View
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
14 years 1 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
IJNSEC
2010
126views more  IJNSEC 2010»
13 years 4 months ago
Comment on Wu et al.'s Server-aided Verification Signature Schemes
In ProvSec 2008, Wu et al. constructed two server-aided verification signature (SAV-) schemes based on BLS signature. In this paper, we provide a new definition of the security of...
Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming ...
CIVR
2003
Springer
107views Image Analysis» more  CIVR 2003»
14 years 3 months ago
A Novel Scheme for Video Similarity Detection
In this paper, a new two-phase scheme for video similarity detection is proposed. For each video sequence, we extract two kinds of signatures with different granularities: coarse ...
Chu-Hong Hoi, Wei Wang, Michael R. Lyu
DCC
2005
IEEE
14 years 9 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao