نتایج جستجو برای: signature

تعداد نتایج: 65887  

2005
Tianjie Cao Dongdai Lin

Digital signature scheme allows a user to sign a message in such a way that anyone can verify the signature, but no one can forge the signature on any other message. In this paper, we show that Xie and Yu’s threshold signature scheme, Huang and Chang’s threshold proxy signature scheme, Qian, Cao and Xue’s pairing-based threshold proxy signature scheme, Xue and Cao’s multi-proxy signature scheme...

2005
Yangjun Chen

The signature file method is a popular indexing technique used in information retrieval and databases. It excels in efficient index maintenance and lower space overhead. Different approaches for organizing signature files have been proposed, such as sequential signature files, bit-slice files, S-trees, and its different variants, as well as signature trees. In this paper, we extends the structu...

In this paper, by considering the notion of $Sigma$-hyperalgebras for an arbitrary signature $Sigma$, we study the notions of regular and strongly regular relations on a $Sigma$-hyperalgebra, $mathfrak{A}$. We show that each regular relation which contains a strongly regular relation is a strongly regular relation. Then we concentrate on the connection between the fundamental relation of $mathf...

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

Journal: :JSW 2011
Haipeng Chen Xuanjing Shen Yingda Lv

This paper introduced a detail ElGamal digital signature scheme, and mainly analyzed the existing problems of the ElGamal digital signature scheme. Then improved the scheme according to the existing problems of ElGamal digital signature scheme, and proposed an implicit ElGamal type digital signature scheme with the function of message recovery. As for the problem that message recovery not being...

Journal: :IACR Cryptology ePrint Archive 2003
Fangguo Zhang Reihaneh Safavi-Naini Chih-Yin Lin

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

2015
Anjali Deshpande Kishor Wane

In Biometric authentication system Signature is an important characteristics to verify the identity of person. Signature is the type of behavioral biometrics. In Signature Verification system, signature is split into two types: Online(dynamic) and Offline(static). In Offline (static) signature verification image is taken as an input of a signature and which is useful in signature verification. ...

2011
Shradhananda Beura Asis Kumar Tripathy

Proxy blind signature is a combination 0f both the properties of proxy signature and blind signature scheme. This scheme is useful in many applications like e-voting, e-payment and mobile agent environments. This paper presents a new proxy blind signature scheme based on discrete logarithm problem(DLP), which satisfies the secure properties of both the blind signature scheme and the proxy signa...

‎The decomposition $Gamma=BH$ of a group $Gamma$ into a subset B ‎and a subgroup $H$ of $Gamma$ induces‎, ‎under general conditions‎, ‎a ‎group-like structure for B‎, ‎known as a gyrogroup‎. ‎The famous‎ concrete realization of a gyrogroup‎, ‎which motivated the emergence ‎of gyrogroups into the mainstream‎, ‎is the space of all ‎relativistically admissible velocities along with a binary ‎mbox{...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید