Sciweavers

118 search results - page 9 / 24
» On the Security of Digital Signature Schemes Based on Error-...
Sort
View
ASIACRYPT
2000
Springer
13 years 12 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
CCR
2000
101views more  CCR 2000»
13 years 7 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ASIACRYPT
2003
Springer
14 years 21 days ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
14 years 4 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insuļ¬ƒcient due to ā€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 22 days ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging ļ¬elds and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...