Sciweavers

915 search results - page 58 / 183
» Proof labeling schemes
Sort
View
IJNSEC
2008
107views more  IJNSEC 2008»
13 years 8 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
TASLP
2010
84views more  TASLP 2010»
13 years 6 months ago
Wideband and Isotropic Room Acoustics Simulation Using 2-D Interpolated FDTD Schemes
—In this paper, a complete method for finite-difference time-domain modeling of rooms in 2-D using compact explicit schemes is presented. A family of interpolated schemes using ...
Konrad Kowalczyk, Maarten van Walstijn
EUROCRYPT
1997
Springer
13 years 11 months ago
A Secure and Optimally Efficient Multi-Authority Election Scheme
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the ...
Ronald Cramer, Rosario Gennaro, Berry Schoenmakers
ASIACRYPT
2000
Springer
14 years 9 days ago
A New Forward-Secure Digital Signature Scheme
nded abstract of this work appears Advances in Cryptology — Asiacrypt 2000, Tatsuaki Okamoto, editor, Lecture Notes in Computer Science vol. 1976, Springer-Verlag, 2000. c IACR A...
Michel Abdalla, Leonid Reyzin
ICPPW
2002
IEEE
14 years 27 days ago
Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks
Abstract—It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures ...
SuKyoung Lee, Chul Kim, David W. Griffith