Results 31 to 40 of about 10,264,102 (368)

Signature schemes with a fuzzy private key

open access: yesInternational Journal of Information Security, 2019
In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also ...
Kenta Takahashi   +4 more
semanticscholar   +1 more source

Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory

open access: yesMathematics, 2022
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo   +4 more
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

A Private Key Management Scheme on Blockchain Against Collusion Attacks [PDF]

open access: yesJisuanji gongcheng, 2020
To address the security of the recovery of lost private keys on the blockchain,this paper proposes a distributed management scheme for private keys based on threshold secret sharing.The scheme combines the user’s private key with the secret password as a
ZHOU Jian, QU Ran
doaj   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Coalition Formation in a Legislative Voting Game [PDF]

open access: yes, 2013
We experimentally investigate the Jackson-Moselle (2002) model where legislators bargain over policy proposals and the allocation of private goods. Key comparative static predictions of the model hold as policy proposals shift in the predicted direction ...
Christiansen, N.   +2 more
core   +2 more sources

Forward-Security in Private-Key Cryptography [PDF]

open access: yes, 2002
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai   +14 more
core   +2 more sources

F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction

open access: yesACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services
In this paper, we proposed F2Key, the first earable physical security system based on commercial off-the-shelf headphones. F2Key enables impactful applications, such as enhancing voiceprint-based authentication systems, reliable voice assistants, audio ...
Di Duan   +6 more
semanticscholar   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy