Filters








88,072 Hits in 4.1 sec

Group Discounts Compatible with Buyer Privacy [article]

Josep Domingo-Ferrer, Alberto Blanco-Justicia
2014 arXiv   pre-print
Specifically, we present a protocol for privacy-preserving group discounts. The protocol allows a group of buyers to prove how many they are without disclosing their identities.  ...  Coupled with an anonymous payment system, this makes group discounts compatible with buyer privacy (that is, buyer anonymity).  ...  IBDT Signature Scheme We outline a general identity-based dynamic threshold signature scheme, namely the second protocol proposed in [7] .  ... 
arXiv:1412.0529v1 fatcat:epevdtt7cvgnlacgvpt46346eu

Admission control in Peer-to-Peer

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
2003 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03  
Among other things, our experimental results demonstrate that, unfortunately, advanced cryptographic constructs (such as verifiable threshold signatures) are not yet ready for prime time.  ...  This paper builds upon some recent work [11] which constructed a peer group admission control framework based on different policies and corresponding cryptographic techniques.  ...  However, especially for dynamic thresholds, it is imperative to determine the current group size.  ... 
doi:10.1145/986858.986873 dblp:conf/sasn/SaxenaTY03 fatcat:rdbcdmq4snaufo6nlygldowkrq

Using Complex Networks for Offline Handwritten Signature Characterization [chapter]

César Armando Beltrán Castañón, Ronald Juárez Chambi
2014 Lecture Notes in Computer Science  
We used a database composed of 960 offline signatures groups; every group corresponds to one person with 24 genuine and 30 forged signatures.  ...  This is represented as an adjacency matrix where there are applied degree descriptors and dynamic evolution property of complex networks in order to generate the feature vector of offline signatures.  ...  This public database termed GPDS960Signature contains 960 groups of signatures, where each group belongs to particular person. Each person has 24 genuine signatures and 30 forged signatures.  ... 
doi:10.1007/978-3-319-12568-8_71 fatcat:nopsdi2qg5h5fhonzj7iazfzka

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Jianhua Zhu, Guohua Cui, Shiyang Zhou
2009 International Journal of Information Technology and Computer Science  
A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes.  ...  Index Terms-group signature, forward security, member revocation, ahead signature, threshold ________________________________________________________ Manuscript  ...  Once a group member is dropped from group, its signatures will be regarded as invalid. As a practical group signature scheme, it should permit member to join and quit dynamically.  ... 
doi:10.5815/ijitcs.2009.01.03 fatcat:i3bkfqvpuzfsfcjrkbtmx6mh64

Page 9828 of Mathematical Reviews Vol. , Issue 2003m [page]

2003 Mathematical Reviews  
weakness in the existing group-oriented threshold signature schemes slows down the application of the threshold signature.  ...  Summary: “A group-oriented (7, N) threshold signature is a spe- cial kind of digital signature scheme, in which some members of a group can sign a document on behalf of the group; however, the se- curity  ... 

ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY

H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  This paper presents a significantly improved construction and a complete rewrite and evaluation of our implementation that can significantly improves the overall concept of security for MANETs by using threshold  ...  public key management, partial signature aggregation and entity management structure for dynamically adjustable groups.  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy [article]

Hu Xiong, Jianbin Hu, Tao Yang, Wei Xin, Zhong Chen
2010 arXiv   pre-print
In this paper, we introduce an efficient and trustworthy conditional privacy-preserving communication protocol for VANETs based on proxy re-signature.  ...  The proposed protocol is characterized by the Trusted Authority (TA) designating the Roadside Units (RSUs) to translate signatures computed by the On-Board Units (OBUs) into one that are valid with respect  ...  In addition, the threshold in the proposed scheme should be adaptive, that is to say, the sender can dynamically change the threshold according to the traffic context and scenarios. B.  ... 
arXiv:1008.5015v1 fatcat:irf7exgzdzbe3k4rkl6xvgtg7i

Classification System for Malware Identification and Detection

Tushar Punjabi, Udayraj Biradar, Dnyanashwar Kawade, Akash Battin, A.A. Pund
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Signature based malware detection systems have been a tremendously utilized reaction to the unavoidable issue of malware.  ...  A correct flowgraph coordinating algorithm is utilized that utilizations string based signatures, and can recognize malware with close constant execution.  ...  The threshold values were fixed after through pilot study. Fig 3 : 3 control flow graph high level structured graph signature.  ... 
doi:10.23956/ijarcsse/v7i3/0172 fatcat:wvbmso35avbidbl5dgb2g4sige

Defense against misbehavior in anonymous vehicular ad hoc networks

Jinyuan Sun, Yuguang Fang
2009 Ad hoc networks  
Our scheme leverages some threshold authentication technique that dynamically revokes a user's credential, while providing the flexibility of whether to reveal the user's identity and tolerating unintentional  ...  manager in group signature schemes.  ...  The dynamic revocation protocol is based on the dynamic k-times anonymous authentication [20] which we call a threshold authentication technique, with k the threshold beyond which any additional number  ... 
doi:10.1016/j.adhoc.2009.04.013 fatcat:w2sg62iiwrcijgerrzghnr7nzm

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022 Cryptography  
Any group user can produce a signature while hiding his identity in a group. Although group signatures have predefined group settings, ring signatures allow users to form ad-hoc groups.  ...  Group signatures and ring signatures are the two leading competitive signature schemes with a rich body of research. Both group and ring signatures enable user anonymity with group settings.  ...  [97] achieved a similar tracing method with a threshold protocol and presented short group signatures.  ... 
doi:10.3390/cryptography6010003 fatcat:dby2hr4g4zhqtemdm3tm43552u

Off-line Identification With Handwritten Signature Images: Survey and Perspectives [chapter]

Robert Sabourin, Réjean Plamondon, Guy Lorette
1992 Structured Document Image Analysis  
Finally, the local comparison of gray levels between pairs of primitives next to each node of the static solution path N results in a pseudo dynamic similarity measure iJd (Pr, Pt).  ...  The first part of this paper presents a survey of the literature on automatic handwritten signature verification systems using binary or graylevel images, and focuses primarily on preprocessing techniques  ...  Two global features (the ratio of signature width to short-stroke height and to long-stroke height) and two types of local features (the ratio of the height of a long stroke to the height of the short  ... 
doi:10.1007/978-3-642-77281-8_10 fatcat:fjb4qdu6pfbqtdi7geocjmxvoq

Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software

Taeho Kwon, Zhendong Su
2011 2011 IEEE 11th International Conference on Data Mining  
We show that software instances derived from the same code exhibit similar behavior signatures and develop effective algorithms to cluster and match behavior signatures.  ...  Then we abstract a runtime trace of a program P into a regular expression e over the pattern alphabet Σ to produce P 's behavior signature.  ...  Previous work on dynamic signature generation/matching has focused on generating malware signatures [4, 5, 13, 26] .  ... 
doi:10.1109/icdm.2011.104 dblp:conf/icdm/KwonS11 fatcat:ltgdw2rqbzf6fmpclvdihty3ce

ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS

ATEEQ AHMED H, SAMSON PAUL K, HARISH KUMAR REDDY B
2020 International Journal of Engineering Technology and Management Sciences  
of public key management, partial signature aggregation and entity management structure for dynamically adjustable groups.  ...  Partial signatures and threshold signatures are generated as the function of ID and verified. These partial signatures then are combined to form threshold multi-signatures.  ... 
doi:10.46647/ijetms.2020.v04i05.008 fatcat:4vdvqs6hfzhttl6ms3zlirs3q4

A Remote Attestation Mechanism Using a Threshold Ring Signature for a Perception Layer of Distributed Networking

Jing Huang, Jia Chen, Hui-Juan Zhang, Zhe-Yuan Sun, Shen He
2022 Wireless Communications and Mobile Computing  
In this paper, we investigate the remote proof scheme applicable to the IoT perception layer and propose a remote attestation mechanism using a threshold ring signature for a perception layer of distributed  ...  Wireless Communications and Mobile Computing Meanwhile, the group signature length of TRS-RAM is short.  ...  The group administrator in the group signature scheme can revoke the anonymity of the group signature, while the group in the ring signature can select and hide the identity of the signer and does not  ... 
doi:10.1155/2022/6603754 doaj:79dafe146f2e4158966f25b5262c5995 fatcat:swktij72ejghtonbsfkrrm7dpe

Efficient and Adaptive Threshold Signatures for Ad hoc networks

Roberto Di Pietro, Luigi Vincenzo Mancini, Giorgio Zanin
2007 Electronical Notes in Theoretical Computer Science  
The novelty of the scheme is in that it easily and efficiently enables dynamic increase of the threshold, according to the needs of the group, so that the service provides both adaptiveness to the level  ...  In this paper, we propose a secure, flexible, robust and fully distributed signature service, for ad hoc groups.  ...  In particular, we have proposed a dynamically adjustable signature threshold scheme.  ... 
doi:10.1016/j.entcs.2006.11.012 fatcat:3dos5dw6yvgibonlko6knkpd2i
« Previous Showing results 1 — 15 out of 88,072 results