Sciweavers

IJNSEC
2008
104views more  IJNSEC 2008»
13 years 11 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong
IJACT
2008
102views more  IJACT 2008»
13 years 11 months ago
An optimistic fair exchange protocol and its security in the universal composability framework
: Fair exchange protocols allow both or neither of two parties to obtain the other's items, and this property is essential in e-commerce. In this paper, we construct an optimi...
Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto
IJACT
2008
64views more  IJACT 2008»
13 years 11 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
CSJM
2006
77views more  CSJM 2006»
13 years 11 months ago
An Approach to Shorten Digital Signature Length
A new method is proposed to design short signature schemes based on difficulty of factorizing a composite number n = qr, where q and r are two large primes. Using the method new d...
Nikolay A. Moldovyan
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 11 months ago
Performance Analysis of CDMA Signature Optimization with Finite Rate Feedback
We analyze the performance of CDMA signature optimization with finite rate feedback. For a particular user, the receiver selects a signature vector from a signature codebook to avo...
Wei Dai, Youjian Liu, Brian Rider
ENTCS
2008
81views more  ENTCS 2008»
13 years 11 months ago
Signature Compilation for the Edinburgh Logical Framework
This paper describes the Signature Compiler, which can compile an LF signature to a custom proof checker in either C++ or Java, specialized for that signature. Empirical results a...
Michael Zeller, Aaron Stump, Morgan Deters
CSI
2008
75views more  CSI 2008»
13 years 11 months ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
CHINAF
2008
110views more  CHINAF 2008»
13 years 11 months ago
Classification of signature-only signature models
We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoret...
Zhengjun Cao, Mulan Liu
BMCBI
2008
132views more  BMCBI 2008»
13 years 11 months ago
The Average Mutual Information Profile as a Genomic Signature
Background: Occult organizational structures in DNA sequences may hold the key to understanding functional and evolutionary aspects of the DNA molecule. Such structures can also p...
Mark Bauer, Sheldon M. Schuster, Khalid Sayood
BMCBI
2008
108views more  BMCBI 2008»
13 years 11 months ago
Signature Evaluation Tool (SET): a Java-based tool to evaluate and visualize the sample discrimination abilities of gene express
Background: The identification of specific gene expression signature for distinguishing sample groups is a dominant field in cancer research. Although a number of tools have been ...
Chih-Hung Jen, Tsun-Po Yang, Chien-Yi Tung, Shu-Ha...