Sciweavers

530 search results - page 30 / 106
» Practical Threshold Signatures
Sort
View
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
13 years 9 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
ICIP
2003
IEEE
14 years 9 months ago
On multivariate estimation by thresholding
Despite their simplicity, scalar threshold operators effectively remove additive white Gaussian noise from wavelet detail coefficients of many practical signals. This paper explor...
Alyson K. Fletcher, Vivek K. Goyal, Kannan Ramchan...
ICALP
2005
Springer
14 years 1 months ago
Hierarchical Group Signatures
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the si...
Mårten Trolin, Douglas Wikström
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
14 years 16 days ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter
FC
2006
Springer
139views Cryptology» more  FC 2006»
13 years 11 months ago
Defeating Malicious Servers in a Blind Signatures Based Voting System
In this paper, we present two failures in the blind signatures based voting system Votopia [2] which has been tested during the last World Soccer Cup. We then propose a fix which r...
Sébastien Canard, Matthieu Gaud, Jacques Tr...