Sciweavers

PR
1998
97views more  PR 1998»
13 years 4 months ago
On-line signature verification based on logarithmic spectrum
—In this paper, an on-line signature verification scheme based on similarity measurement of logarithmic spectrum is proposed. The principal components of the logarithmic spectru...
Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou
JSS
2002
96views more  JSS 2002»
13 years 4 months ago
A group signature scheme with strong separability
Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages anonymously on behalf of the group. Only a designated group manager is able to iden...
Shundong Xia, Jinyuan You
INFORMATICALT
2000
123views more  INFORMATICALT 2000»
13 years 4 months ago
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weak...
Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang
CCR
2000
101views more  CCR 2000»
13 years 4 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
JCST
2007
98views more  JCST 2007»
13 years 4 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
TIP
2008
138views more  TIP 2008»
13 years 4 months ago
Rotation-Invariant Texture Retrieval via Signature Alignment Based on Steerable Sub-Gaussian Modeling
This paper addresses the construction of a novel efficient rotation-invariant texture retrieval method that is based on the alignment in angle of signatures obtained via a steerabl...
George Tzagkarakis, Baltasar Beferull-Lozano, Pana...
TCSV
2008
140views more  TCSV 2008»
13 years 4 months ago
Face-Based Digital Signatures for Video Retrieval
The characterization of a video segment by a digital signature is a fundamental task in video processing. It is necessary for video indexing and retrieval, copyright protection and...
Costas I. Cotsaces, Nikos Nikolaidis, Ioannis Pita...
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
13 years 4 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
AMC
2005
158views more  AMC 2005»
13 years 4 months ago
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
At the fourth ACM conference on electronic commerce (EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is a...
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 4 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen