نتایج جستجو برای: signature

تعداد نتایج: 65887  

2003
Fangguo Zhang Reihaneh Safavi-Naini Chih-Yin Lin

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

2015
Yonglong Tang Alexandra Boldyreva

Ordered multisignature allows signers attest to a common message as well as the order in whey they signed. Unlike multi-signature, aggregate signature aggregate signature scheme provides a method to aggregate signature by signature on different messages. In this paper, we presented an ordered multisignature provably secure without random oracles. We mainly focus on construction of perfectly hid...

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

Localizing text regions in images taken from natural scenes is one of the challenging problems dueto variations in font, size, color and orientation of text. In this paper, we introduce a new concept socalled Edge Color Signature for localizing text regions in an image. This method is able to localizeboth Farsi and English texts. In the proposed method rst a pyramid using diff...

Journal: :Fundam. Inform. 2003
Cheng-Chi Lee Wei-Pang Yang Min-Shiang Hwang

Abstract. With the help of a blind signature scheme, a requester can obtain a signature on a message from a signer such that the signer knows nothing about the content of the messages and is unable to link the resulting message-signature pair; namely, a blind signature scheme can achieve both blindness and untraceability. Due to the above properties, the blind signature scheme can be used in cr...

Journal: :IACR Cryptology ePrint Archive 2003
Hung-Min Sun Bin-Tsan Hsieh

Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different app...

Journal: :IEEE Trans. Information Theory 2001
Joseph A. O'Sullivan Natalia A. Schmid

In signature authentication schemes, a candidate signature presented for authentication is compared to a previous signature measurement. Uniqueness of a signature is a result of a random physical process underlying the signature formation. In this paper, we model signatures as realizations of random processes with known statistics. Rate functions for the false alarm and miss probabilities are d...

2014
Feng Cai Wangmei Guo Ximeng Liu

In universal designated verifier signature scheme, signature holder can designate the signature to any desired designated verifier. Only the designated verifier can believe that the signature holder does have a valid publicly verifiable signature. Attribute based encryption is a novel public key primitive in cryptography and attribute based signature can provide a powerful way for users to cont...

Journal: :Photochemistry and Photobiology 2014

Journal: :Revue québécoise de linguistique 1981

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید