Sciweavers

262 search results - page 18 / 53
» Proposal of a Signature Scheme Based on STS Trapdoor
Sort
View
ICDAR
2007
IEEE
15 years 3 months ago
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and m...
Manuel R. Freire, Julian Fiérrez-Aguilar, M...
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 3 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
IJNSEC
2008
91views more  IJNSEC 2008»
14 years 9 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IADIS
2004
14 years 11 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
12 years 12 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman