335,915 Hits in 4.9 sec

On the value of threshold signatures

Niklas Borselius, Chris J. Mitchell, Aaron Wilson
2002 ACM SIGOPS Operating Systems Review  
The purpose of this paper is to present a rather simple alternative to threshold signatures which raises questions about the value of such schemes, at least when applied to the mobile agent scenario.  ...  Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4] .  ...  This certificate also contains policy information which indicates precisely the purpose of the certificate, and also the parameter k, indicating the 'threshold value' (as above).  ... 
doi:10.1145/583800.583804 fatcat:ipbrbqwndrcfnnpjmonw5omqw4

On-line signature verification

Anil K. Jain, Friederike D. Griess, Scott D. Connell
2002 Pattern Recognition  
Experiments on a database containing a total of 1232 signatures of 102 individuals show that writer-dependent thresholds yield better results than using a common threshold. ?  ...  The similarity between an input signature and the reference set is computed using string matching and the similarity value is compared to a threshold.  ...  methods for computing the dissimilarity value between the test signature and the reference set on DB1 Feature Type of Threshold Percentage of genuine Percentage of forgery subset forgery (TH)  ... 
doi:10.1016/s0031-3203(01)00240-0 fatcat:i5rqpeedyfdqpduufh7yrtbgmi

Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

Walid Hussein, Mostafa A. Salama, Osman Ibrahim, N. Mastorakis, V. Mladenov, A. Bulucea
2016 MATEC Web of Conferences  
Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges.  ...  Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.  ...  in the signature image which will make accuracy of the software less so the best value of hessian threshold is 500.  ... 
doi:10.1051/matecconf/20167605004 fatcat:lw727k7lc5fuxppdjvyciwmaqq

Image Processing in Scale-Orientation Space

R. Zwiggelaar
2002 Procedings of the British Machine Vision Conference 2002  
A series of filtering techniques, based on selectively removing values in scale-orientation space, have been developed.  ...  Evaluation of the described techniques is based on a set of standard images which contain linear structures superimposed on a complex texture background.  ...  The first approach was based on the basic thresholding of the values in the scale-orientation signatures and allowed for the transportation of signature values below the threshold at large scales to signature  ... 
doi:10.5244/c.16.18 dblp:conf/bmvc/Zwiggelaar02 fatcat:ce4kns7ly5aktjq7wggs4zp6ja

Effects of threshold choice on biological conclusions reached during analysis of gene expression by DNA microarrays

K.-H. Pan, C.-J. Lih, S. N. Cohen
2005 Proceedings of the National Academy of Sciences of the United States of America  
We discovered that support for this conclusion highly depends on the threshold used to create gene expression signatures.  ...  An analysis of the effects of threshold decisions in one of these studies [Ramaswamy, S., Ross, K. N., Lander, E. S. & Golub, T. R. (2003) Nat.  ...  Tibshirani for helpful comments on the manuscript and R. Lin for technical assistance.  ... 
doi:10.1073/pnas.0502674102 pmid:15951424 pmcid:PMC1149502 fatcat:kipkngpkirc4hbdvurpmffldce

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications

Jian Ren, Lein Harn
2013 IEEE Transactions on Wireless Communications  
Furthermore, the length of the threshold ring signature is the same as the regular ring signature introduced by Rivest et. al., which is 2n + 2, while the length of the threshold ring signature scheme  ...  The complexity of signature generation and signature verification of the proposed threshold ring signature scheme are O(t log 2 2 t) and O(n), respectively.  ...  It outputs a value z ∈ {0, 1} b , such that for any given k, v, s, 1 ≤ s ≤ n, and fixed values of y i , i = s, the function C k,v is a one-to-one mapping from y s to the output z.  ... 
doi:10.1109/twc.2012.12.112120 fatcat:zxiigwhhefgbjidmqwkyea2uk4

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Johann Van Der Merwe, Dawoud S. Dawoud, Stephen McDonald
2007 IEEE Transactions on Parallel and Distributed Systems  
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members  ...  In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature.  ...  [15] , [22] on the discrete logarithm of the public values.  ... 
doi:10.1109/tpds.2007.1005 fatcat:a5rjvg6lh5c3jo3kzz45zg7kau

A Reliable Binarization Method for Offline Signature System Based on Unique Signer's Profile

Ghassan Marwan Abdulfattah, Mohammad Nazir Ahmad, Renas Rajab Asaad
2018 International Journal of Innovative Computing, Information and Control  
Comparing the proposed thresholding technique with the other ones proves that the false acceptance rate (FAR) and false rejection rate (FRR) have been improved for different types of collected signatures  ...  The proposed offline signature system will use only one master signature to build the signer's profile which will be used in the comparison stage.  ...  In ZCT, the binarization process will not be done by estimating the threshold value using one of the traditional techniques as Fisher's criterion for linear discriminant analysis used by Otsu thresholding  ... 
doi:10.24507/ijicic.14.02.573 fatcat:ujt5qsvthrh5nawnx5jsmdhteu

Robust Threshold DSS Signatures [chapter]

Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, Tal Rabin
1996 Lecture Notes in Computer Science  
We prove thc security of our schemes solely based on the hardness of forging a regular DSS signature.  ...  produce a valid DSS signature on any given message, but no subset o f t corrupted players can forge a signature (in particular, cannot learn the signature key).  ...  Introduction Using a threshold signature scheme, digital signatures can be produced by a group of players rather than by one party.  ... 
doi:10.1007/3-540-68339-9_31 fatcat:ykm5xcfoonc2vbpxaod7a7yhia

Experimental Evaluation of Asynchronous Binary Byzantine Consensus Algorithms with t < n/3 and O(n^2) Messages and O(1) Round Expected Termination [article]

Tyler Crain
2020 arXiv   pre-print
Two different non-interactive threshold common coin implementations are tested, one using threshold signatures, and one based on the Diffe-Hellman problem using validity proofs [11].  ...  Each of the four algorithms have different requirements for the random coin, for the number of messages needed per round, whether or not cryptographic signatures are needed, among other details.  ...  Given that the signatures will be of the same message and of a specific count, threshold signatures can be used to reduce the size of the proofs to a single threshold signature.  ... 
arXiv:2004.09547v2 fatcat:mejxed43lvhqdgmspmsfmuecba

On the Security of Two Threshold Signature Schemes with Traceable Signers [chapter]

Guilin Wang, Xiaoxi Han, Bo Zhu
2003 Lecture Notes in Computer Science  
considered as the signers of the new threshold signature for the same message.  ...  A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t − 1 or less members cannot do the same thing.  ...  On the Traceability of Li et al.'s Schemes The methods of tracing back in their two threshold signature schemes are the same.  ... 
doi:10.1007/978-3-540-45203-4_9 fatcat:no52tobpdjayrlkfkknpyepst4

A Digital Signature with Threshold Generation and Verification [article]

Sunder lal, Manoj Kumar
2004 arXiv   pre-print
Shamir's threshold scheme and Schnorr's signature scheme are used to realize the proposed scheme.  ...  This paper proposes a signature scheme where the signatures are generated by the cooperation of a number of people from a given group of senders and the signatures are verified by a certain number of people  ...  Here designated sub -groups are characterized by threshold values. The threshold value can be different for signature generation and for signature verification.  ... 
arXiv:cs/0409014v3 fatcat:s24qah65p5c5xf2p2cmf75lwga

Time Series Based for Online Signature Verification

Pande Sutawan, Darma Putra
2013 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test  ...  Abstract Signature verification system is to match the tested signature with a claimed signature.  ...  FNMR and FMR values are very dependent on the threshold value T is used. Different T values produce FNMR, FMR and the EER is very small at a certain threshold value.  ... 
doi:10.12928/telkomnika.v11i4.1186 fatcat:45j2zmxwivf33iwy7ha4f67vry

Identity Based Threshold Ring Signature [chapter]

Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2005 Lecture Notes in Computer Science  
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet  ...  To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) IDbased ring signature  ...  threshold ring signature σ on the message m.  ... 
doi:10.1007/11496618_17 fatcat:boetdxk4i5dc5lpowm4zpl57qm

Performance of an Off-Line Signature Verification Method Based on Texture Features on a Large Indic-Script Signature Dataset

Srikanta Pal, Alireza Alaei, Umapada Pal, Michael Blumenstein
2016 2016 12th IAPR Workshop on Document Analysis Systems (DAS)  
In this paper, a signature verification method based on texture features involving off-line signatures written in two different Indian scripts is proposed.  ...  The Nearest Neighbour (NN) technique is considered as the similarity metric for signature verification in the proposed method.  ...  Using different threshold values in the proposed signature verification method, the results were obtained to demonstrate the behaviour of FAR, FRR and AER values on the BHSig260 dataset.  ... 
doi:10.1109/das.2016.48 dblp:conf/das/PalAPB16 fatcat:uotybgz2kve2zgxa2te4oazof4
« Previous Showing results 1 — 15 out of 335,915 results