A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the value of threshold signatures
2002
ACM SIGOPS Operating Systems Review
The purpose of this paper is to present a rather simple alternative to threshold signatures which raises questions about the value of such schemes, at least when applied to the mobile agent scenario. ...
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4] . ...
This certificate also contains policy information which indicates precisely the purpose of the certificate, and also the parameter k, indicating the 'threshold value' (as above). ...
doi:10.1145/583800.583804
fatcat:ipbrbqwndrcfnnpjmonw5omqw4
On-line signature verification
2002
Pattern Recognition
Experiments on a database containing a total of 1232 signatures of 102 individuals show that writer-dependent thresholds yield better results than using a common threshold. ? ...
The similarity between an input signature and the reference set is computed using string matching and the similarity value is compared to a threshold. ...
methods for computing the dissimilarity value between the test signature and the reference set on DB1 Feature
Type of
Threshold
Percentage of genuine
Percentage of forgery
subset
forgery
(TH) ...
doi:10.1016/s0031-3203(01)00240-0
fatcat:i5rqpeedyfdqpduufh7yrtbgmi
Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions
2016
MATEC Web of Conferences
Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. ...
Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions. ...
in the signature image which will make accuracy of the software less so the best value of hessian threshold is 500. ...
doi:10.1051/matecconf/20167605004
fatcat:lw727k7lc5fuxppdjvyciwmaqq
Image Processing in Scale-Orientation Space
2002
Procedings of the British Machine Vision Conference 2002
A series of filtering techniques, based on selectively removing values in scale-orientation space, have been developed. ...
Evaluation of the described techniques is based on a set of standard images which contain linear structures superimposed on a complex texture background. ...
The first approach was based on the basic thresholding of the values in the scale-orientation signatures and allowed for the transportation of signature values below the threshold at large scales to signature ...
doi:10.5244/c.16.18
dblp:conf/bmvc/Zwiggelaar02
fatcat:ce4kns7ly5aktjq7wggs4zp6ja
Effects of threshold choice on biological conclusions reached during analysis of gene expression by DNA microarrays
2005
Proceedings of the National Academy of Sciences of the United States of America
We discovered that support for this conclusion highly depends on the threshold used to create gene expression signatures. ...
An analysis of the effects of threshold decisions in one of these studies [Ramaswamy, S., Ross, K. N., Lander, E. S. & Golub, T. R. (2003) Nat. ...
Tibshirani for helpful comments on the manuscript and R. Lin for technical assistance. ...
doi:10.1073/pnas.0502674102
pmid:15951424
pmcid:PMC1149502
fatcat:kipkngpkirc4hbdvurpmffldce
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
2013
IEEE Transactions on Wireless Communications
Furthermore, the length of the threshold ring signature is the same as the regular ring signature introduced by Rivest et. al., which is 2n + 2, while the length of the threshold ring signature scheme ...
The complexity of signature generation and signature verification of the proposed threshold ring signature scheme are O(t log 2 2 t) and O(n), respectively. ...
It outputs a value z ∈ {0, 1} b , such that for any given k, v, s, 1 ≤ s ≤ n, and fixed values of y i , i = s, the function C k,v is a one-to-one mapping from y s to the output z. ...
doi:10.1109/twc.2012.12.112120
fatcat:zxiigwhhefgbjidmqwkyea2uk4
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
2007
IEEE Transactions on Parallel and Distributed Systems
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members ...
In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. ...
[15] , [22] on the discrete logarithm of the public values. ...
doi:10.1109/tpds.2007.1005
fatcat:a5rjvg6lh5c3jo3kzz45zg7kau
A Reliable Binarization Method for Offline Signature System Based on Unique Signer's Profile
2018
International Journal of Innovative Computing, Information and Control
Comparing the proposed thresholding technique with the other ones proves that the false acceptance rate (FAR) and false rejection rate (FRR) have been improved for different types of collected signatures ...
The proposed offline signature system will use only one master signature to build the signer's profile which will be used in the comparison stage. ...
In ZCT, the binarization process will not be done by estimating the threshold value using one of the traditional techniques as Fisher's criterion for linear discriminant analysis used by Otsu thresholding ...
doi:10.24507/ijicic.14.02.573
fatcat:ujt5qsvthrh5nawnx5jsmdhteu
Robust Threshold DSS Signatures
[chapter]
1996
Lecture Notes in Computer Science
We prove thc security of our schemes solely based on the hardness of forging a regular DSS signature. ...
produce a valid DSS signature on any given message, but no subset o f t corrupted players can forge a signature (in particular, cannot learn the signature key). ...
Introduction Using a threshold signature scheme, digital signatures can be produced by a group of players rather than by one party. ...
doi:10.1007/3-540-68339-9_31
fatcat:ykm5xcfoonc2vbpxaod7a7yhia
Experimental Evaluation of Asynchronous Binary Byzantine Consensus Algorithms with t < n/3 and O(n^2) Messages and O(1) Round Expected Termination
[article]
2020
arXiv
pre-print
Two different non-interactive threshold common coin implementations are tested, one using threshold signatures, and one based on the Diffe-Hellman problem using validity proofs [11]. ...
Each of the four algorithms have different requirements for the random coin, for the number of messages needed per round, whether or not cryptographic signatures are needed, among other details. ...
Given that the signatures will be of the same message and of a specific count, threshold signatures can be used to reduce the size of the proofs to a single threshold signature. ...
arXiv:2004.09547v2
fatcat:mejxed43lvhqdgmspmsfmuecba
On the Security of Two Threshold Signature Schemes with Traceable Signers
[chapter]
2003
Lecture Notes in Computer Science
considered as the signers of the new threshold signature for the same message. ...
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t − 1 or less members cannot do the same thing. ...
On the Traceability of Li et al.'s Schemes The methods of tracing back in their two threshold signature schemes are the same. ...
doi:10.1007/978-3-540-45203-4_9
fatcat:no52tobpdjayrlkfkknpyepst4
A Digital Signature with Threshold Generation and Verification
[article]
2004
arXiv
pre-print
Shamir's threshold scheme and Schnorr's signature scheme are used to realize the proposed scheme. ...
This paper proposes a signature scheme where the signatures are generated by the cooperation of a number of people from a given group of senders and the signatures are verified by a certain number of people ...
Here designated sub -groups are characterized by threshold values. The threshold value can be different for signature generation and for signature verification. ...
arXiv:cs/0409014v3
fatcat:s24qah65p5c5xf2p2cmf75lwga
Time Series Based for Online Signature Verification
2013
TELKOMNIKA (Telecommunication Computing Electronics and Control)
The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test ...
Abstract Signature verification system is to match the tested signature with a claimed signature. ...
FNMR and FMR values are very dependent on the threshold value T is used. Different T values produce FNMR, FMR and the EER is very small at a certain threshold value. ...
doi:10.12928/telkomnika.v11i4.1186
fatcat:45j2zmxwivf33iwy7ha4f67vry
Identity Based Threshold Ring Signature
[chapter]
2005
Lecture Notes in Computer Science
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet ...
To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) IDbased ring signature ...
threshold ring signature σ on the message m. ...
doi:10.1007/11496618_17
fatcat:boetdxk4i5dc5lpowm4zpl57qm
Performance of an Off-Line Signature Verification Method Based on Texture Features on a Large Indic-Script Signature Dataset
2016
2016 12th IAPR Workshop on Document Analysis Systems (DAS)
In this paper, a signature verification method based on texture features involving off-line signatures written in two different Indian scripts is proposed. ...
The Nearest Neighbour (NN) technique is considered as the similarity metric for signature verification in the proposed method. ...
Using different threshold values in the proposed signature verification method, the results were obtained to demonstrate the behaviour of FAR, FRR and AER values on the BHSig260 dataset. ...
doi:10.1109/das.2016.48
dblp:conf/das/PalAPB16
fatcat:uotybgz2kve2zgxa2te4oazof4
« Previous
Showing results 1 — 15 out of 335,915 results