ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Multi-Trapdoor Commitment Scheme from the RSA Assumption
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e95.a.176
◽
2012
◽
Vol E95-A
(1)
◽
pp. 176-184
Author(s):
Ryo NISHIMAKI
◽
Eiichiro FUJISAKI
◽
Keisuke TANAKA
Keyword(s):
Commitment Scheme
◽
Trapdoor Commitment
Download Full-text
Related Documents
Cited By
References
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme
Journal of Software
◽
10.4304/jsw.5.9.942-949
◽
2010
◽
Vol 5
(9)
◽
Cited By ~ 7
Author(s):
Bo Meng
◽
Zimao Li
◽
Jun Qin
Keyword(s):
Internet Voting
◽
Commitment Scheme
◽
Trapdoor Commitment
Download Full-text
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/978-3-642-14081-5_12
◽
2010
◽
pp. 182-199
◽
Cited By ~ 4
Author(s):
Ryo Nishimaki
◽
Eiichiro Fujisaki
◽
Keisuke Tanaka
Keyword(s):
Commitment Scheme
◽
Trapdoor Commitment
Download Full-text
Security Analysis on Gait-Based Biometric Fuzzy Commitment Scheme Using Smartphone
Simulation Tools and Techniques - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
◽
10.1007/978-3-030-32216-8_34
◽
2019
◽
pp. 353-362
Author(s):
Zhang Min
Keyword(s):
Security Analysis
◽
Commitment Scheme
◽
Fuzzy Commitment Scheme
Download Full-text
A Sub-linear Lattice-Based Submatrix Commitment Scheme
Information Security and Cryptology – ICISC 2020 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-68890-5_5
◽
2021
◽
pp. 87-98
Author(s):
Huang Lin
Keyword(s):
Linear Lattice
◽
Commitment Scheme
Download Full-text
An efficient bit commitment scheme based on factoring assumption
Journal of Electronics (China)
◽
10.1007/s11767-001-0021-8
◽
2001
◽
Vol 18
(2)
◽
pp. 155-159
Author(s):
Ming Zhong
◽
Yixian Yang
Keyword(s):
Bit Commitment
◽
Commitment Scheme
Download Full-text
Automated Cryptographic Analysis of the Pedersen Commitment Scheme
Lecture Notes in Computer Science - Computer Network Security
◽
10.1007/978-3-319-65127-9_22
◽
2017
◽
pp. 275-287
◽
Cited By ~ 3
Author(s):
Roberto Metere
◽
Changyu Dong
Keyword(s):
Commitment Scheme
Download Full-text
Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme
Journal of King Saud University - Computer and Information Sciences
◽
10.1016/j.jksuci.2019.10.011
◽
2019
◽
Cited By ~ 2
Author(s):
Lamiaa A. Elrefaei
◽
Ashwaq M. Al-Mohammadi
Keyword(s):
Machine Vision
◽
Commitment Scheme
◽
Biometric Cryptosystem
◽
Fuzzy Commitment Scheme
Download Full-text
Secure biometric template protection in fuzzy commitment scheme
IEICE Electronics Express
◽
10.1587/elex.4.724
◽
2007
◽
Vol 4
(23)
◽
pp. 724-730
◽
Cited By ~ 46
Author(s):
Andrew Beng Jin Teoh
◽
Jaihie Kim
Keyword(s):
Commitment Scheme
◽
Biometric Template
◽
Template Protection
◽
Fuzzy Commitment Scheme
◽
Biometric Template Protection
Download Full-text
Improve the security of image robust hash using fuzzy commitment scheme
Neural Computing and Applications
◽
10.1007/s00521-012-0850-4
◽
2012
◽
Vol 23
(1)
◽
pp. 67-72
◽
Cited By ~ 1
Author(s):
Zhaoqing Liu
◽
Qiong Li
◽
Xiamu Niu
Keyword(s):
Commitment Scheme
◽
Fuzzy Commitment Scheme
Download Full-text
Reliability-balanced feature level fusion for fuzzy commitment scheme
2011 International Joint Conference on Biometrics (IJCB)
◽
10.1109/ijcb.2011.6117535
◽
2011
◽
Cited By ~ 29
Author(s):
Christian Rathge
◽
Andreas Uhl
◽
Peter Wild
Keyword(s):
Commitment Scheme
◽
Feature Level Fusion
◽
Fuzzy Commitment Scheme
◽
Level Fusion
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close