Sciweavers

162 search results - page 24 / 33
» A Group Signature Scheme from Lattice Assumptions
Sort
View
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
15 years 2 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
IACR
2011
101views more  IACR 2011»
13 years 10 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
109
Voted
IJPRAI
2008
235views more  IJPRAI 2008»
14 years 10 months ago
Shape-Based Individual/Group Detection for Sport Videos Categorization
We present a shape based method for automatic people detection and counting without any assumption or knowledge of camera motion. The proposed method is applied to athletic videos...
Costas Panagiotakis, Emmanuel Ramasso, Georgios Tz...
CCS
2008
ACM
15 years 23 days ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
ASIACRYPT
2003
Springer
15 years 4 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...