搜索结果: 1-13 共查到“计算机科学技术 Signatures”相关记录13条 . 查询时间(0.125 秒)
Online/Offline Signatures for Low-Power Devices
Digital signatures Fiat–Shamir transform pri- vacy preserving authentication
2016/1/23
When digital signature is applied on low-power de-vices, like smart cards, wireless sensors and RFID tags, some spe-cific properties, e.g., better offline storage, more modular and flex-ible deploymen...
Sense, Model and Identify the Load Signatures of HVAC Systems in Metro Stations
Sense Model Identify Load Signatures HVAC Systems Metro Stations
2016/1/22
The Heating Ventilation and Air Conditioning(HVAC) systems in subway stations are energy consuming giants,each of which may consume over 10, 000 Kilowatts per day for cooling and ventilation. To save ...
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we...
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Bilinear Maps Encrypted Signatures
2015/8/5
An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into a...
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
Computational Diffie-Hellman Unforgeable Signatures
2015/8/5
A signature system is said to be strongly unforgeable if the signature is existentially unforgeable and, given signatures on some message M, the adversary cannot produce a new signature on M. Strongly...
Group Signatures with Verifier-Local Revocation
Verifier-Local Revocation signature verifiers
2015/8/5
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's {\sc ngscb} effort (formerly Palladium). Revocation is critical to the secur...
We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on the Str...
Homomorphic Signatures for Polynomial Functions
Polynomial Functions Homomorphic Signatures
2015/8/5
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an efficient algorithm t...
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
binary fields lattice-based signatures
2015/8/5
Our scheme can be used to authenticate linear transformations of signed data, such as those arising when computing mean and least squares fit or in networks that use network coding. Our construction g...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
On blockwise symmetric signatures for matchgates
Matchgates Matchgate identities Holographic algorithm
2012/12/4
We give a classification of blockwise symmetric signatures in the theory of matchgate computations. The main proof technique uses matchgate identities, also known as useful GrassmannPlücker identitie...
COMPUTING NEGENTROPY BASED SIGNATURES FOR TEXTURE RECOGNITION
texture recognition Independent Component Analysis negentropy,Minkowski distance
2010/1/11
The proposed method aims to provide a new tool for texture recognition. For this purpose, a set of texture samples are decomposed by using the FastICA algorithm and characterized by a negentropy based...
Polymorphic worm detection using strong token-pair signatures
Polymorphic worm worm detection
2009/7/28
Malicious software has become a big threat to information systems, which are widely used to store,
transfer and process information for many critical assets. Worms are one of the most harmful network...