Sciweavers

298 search results - page 40 / 60
» Strong Anonymous Signatures
Sort
View
BMVC
2002
13 years 9 months ago
Practical Generation of Video Textures using the Auto-Regressive Process
Recently, there have been several attempts at creating `video textures', that is, synthesising new (potentially infinitely long) video clips based on existing ones. One way t...
Neill W. Campbell, Colin J. Dalton, David P. Gibso...
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
13 years 11 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
11 years 9 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
EUROCRYPT
2007
Springer
14 years 1 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek