Sciweavers

380 search results - page 9 / 76
» Time Capsule Signature
Sort
View
ASIACRYPT
2009
Springer
14 years 1 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
IJNSEC
2008
104views more  IJNSEC 2008»
13 years 7 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong
ICMCS
2008
IEEE
135views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Audio and video signatures for synchronization
Abstract— We propose a framework based on signatures extracted from audio and video streams for automatically measuring and maintaining synchronization between the two streams. T...
Regunathan Radhakrishnan, Kent Terry, Claus Bauer
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 1 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 7 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen