نتایج جستجو برای: one time signature

تعداد نتایج: 3503131  

2013
Andreas Hülsing

Digital signatures are one of the most important cryptographic primitives in practice. They are an enabling technology for eCommerce and eGovernment applications and they are used to distribute software updates over the Internet in a secure way. In this work we introduce two new digital signature schemes: XMSS and its extension XMSS . We present security proofs for both schemes in the standard ...

Journal: :IACR Cryptology ePrint Archive 2010
Gregory M. Zaverucha Douglas R. Stinson

We present a new one-time signature scheme having short signatures. Our new scheme is also the first one-time signature scheme that supports aggregation, batch verification, and which admits efficient proofs of knowledge. It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to ECDSA verification. These properties make our scheme suitable for...

Journal: :journal of medical signals and sensors 0
dr alireza mehri dehnavi mohammadreza sehhati dr hossein rabbani

background: using primary tumor gene expression has been shown to have the ability of finding metastasis-driving gene markers for the prediction of breast cancer recurrence (bcr). however, there are some difficulties associated with the analysis of microarray data which led to poor predictive power and inconsistency of the previously introduced gene signatures. methods: in this study a hybrid m...

Journal: :JNW 2012
Jun Zhang

Arbitrated signature provides that the signatory signs a message with his private key by quantum cryptography, while the signature receiver verifies the signature with the arbitrator’s assistance. In this work, security analysis was given to the arbitrated quantum signature (AQS) and results showed that the receiver Bob and the attacker can forge the signature. Then this paper gives a new quant...

Journal: :Des. Codes Cryptography 2007
Chris J. Mitchell Fred Piper Peter R. Wild

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...

2016
Brian Harding Ashish Dhawan Aditi R. Ganesan

Face and signature are still two most dominant authentication modes in banking, legal documents, or personnel records in spite availability of more robust biometric modes. Hence, it is imperative to develop low-cost and reliable automated face recognition and signature verification system. Therefore, this paper presents our work in development of a two-in-one portable low-cost dsPIC30F3013 digi...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract this research is about a longitudinal case study of english morpheme acquisition by a persian speaking child l2 learner of english (2 .9-3).the goal of this research has been discovery of the child ‘s ability in acquiring of english morphemes in a persian context while only one person (the child’ s father)has been talking to her.this child has also been exposed to english languag...

Journal: :CoRR 2011
Minal Tomar Pratibha Singh

Signature used as a biometric is implemented in various systems as well as every signature signed by each person is distinct at the same time. So, it is very important to have a computerized signature verification system. In offline signature verification system dynamic features are not available obviously, but one can use a signature as an image and apply image processing techniques to make an...

2015
Maarten van Elsas Jan C.A. van der Lubbe Jos H. Weber

We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each member’s secret key remains the same for all group compositions. The downside of this approach is th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید