Sciweavers

530 search results - page 9 / 106
» Practical Threshold Signatures
Sort
View
ICPR
2010
IEEE
15 years 1 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
LATINCRYPT
2010
14 years 8 months ago
A Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as securi...
Pierre-Louis Cayrel, Richard Lindner, Markus R&uum...
JCM
2008
74views more  JCM 2008»
14 years 10 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
AFRICACRYPT
2009
Springer
15 years 5 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
PKC
2007
Springer
105views Cryptology» more  PKC 2007»
15 years 4 months ago
Improved On-Line/Off-Line Threshold Signatures
Emmanuel Bresson, Dario Catalano, Rosario Gennaro