Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Digital Signature Algorithm (DSA) is an underlying algorithm to form a signature in the Digital Signature Standard (DSS). DSA uses a new random number (or nonce) each time a signa...
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Many systems are available to verify the signatures in bank cheques. In this paper, we verify the offline signatures by taking a boundary of the entire signature and do the pixel ...
Ashwin C. S., Harihar V., Karthick G., Karthik A.,...
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Features representing information about pressure distribution from a static image of a handwritten signature are analyzed for an offline verification system. From gray-scale image...
Jesus Francisco Vargas Bonilla, Miguel Angel Ferre...
In this paper, we propose a new approach for symbolic representation of off-line signatures based on relative distances between centroids useful for verification. Distances betwee...
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...