Sciweavers

135 search results - page 1 / 27
» Bounded Vector Signatures and their Applications
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 4 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
ICC
2007
IEEE
13 years 11 months ago
New Bounds on the Aperiodic Total Squared Correlation of Binary Signature Sets and Optimal Designs
— We derive new bounds on the aperiodic total squared correlation (ATSC) of binary antipodal signature sets for any number of signatures K and any signature length L. We then pre...
Harish Ganapathy, Dimitrios A. Pados, George N. Ka...
ASIACRYPT
2009
Springer
13 years 11 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 7 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
ICPR
2006
IEEE
13 years 11 months ago
A fusion methodology based on Dempster-Shafer evidence theory for two biometric applications
Different features carry more or less rich and varied pieces of information to characterize a pattern. The fusion of these different sources of information can provide an opportun...
Muhammad Arif, Thierry Brouard, Nicole Vincent