Sciweavers

795 search results - page 1 / 159
» On the value of threshold signatures
Sort
View
SIGOPS
2002
69views more  SIGOPS 2002»
13 years 4 months ago
On the value of threshold signatures
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
ICPR
2010
IEEE
13 years 7 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
PROVSEC
2007
Springer
13 years 10 months ago
Practical Threshold Signatures Without Random Oracles
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on the recently proposed signature scheme of Waters in EUROCRYPT’05. The new thre...
Jin Li, Tsz Hon Yuen, Kwangjo Kim
AVBPA
2005
Springer
256views Biometrics» more  AVBPA 2005»
13 years 10 months ago
Modification of Intersession Variability in On-Line Signature Verifier
For Pen-input on-line signature verification algorithms, the influence of intersession variability is a considerable problem because hand-written signatures change with time, causi...
Yasunori Hongo, Daigo Muramatsu, Takashi Matsumoto
ISPEC
2005
Springer
13 years 10 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng