Sciweavers

1610 search results - page 65 / 322
» Identity Based Multisignatures
Sort
View
104
Voted
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 1 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
JUCS
2007
96views more  JUCS 2007»
15 years 1 months ago
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Sanjit Chatterjee, Palash Sarkar
ICASSP
2011
IEEE
14 years 5 months ago
Identification and compensation of Wiener-Hammerstein systems with feedback
Efficient operation of RF power amplifiers requires compensation strategies to mitigate nonlinear behavior. As bandwidth increases, memory effects become more pronounced, and Vo...
Andrew K. Bolstad, Benjamin A. Miller, Joel Goodma...
158
Voted
DIM
2006
ACM
15 years 7 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 8 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase