Sciweavers

525 search results - page 10 / 105
» Threshold Schemes with Disenrollment
Sort
View
ACISP
2005
Springer
14 years 3 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
ASIACRYPT
2001
Springer
14 years 2 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
ICICS
2010
Springer
13 years 8 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
CIVR
2004
Springer
189views Image Analysis» more  CIVR 2004»
14 years 3 months ago
Feature Based Cut Detection with Automatic Threshold Selection
There has been much work concentrated on creating accurate shot boundary detection algorithms in recent years. However a truly accurate method of cut detection still eludes researc...
Anthony Whitehead, Prosenjit Bose, Robert Lagani&e...
EUROCRYPT
2000
Springer
14 years 1 months ago
Practical Threshold Signatures
We present an RSA threshold signature scheme. The scheme enjoys the following properties:
Victor Shoup