A performance evaluation of local descriptors

K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …

Dynamic accumulators and application to efficient revocation of anonymous credentials

J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 18 …, 2002 - Springer
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …

Compact e-cash

J Camenisch, S Hohenberger… - … Conference on the Theory …, 2005 - Springer
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …

Universal accumulators with efficient nonmembership proofs

J Li, N Li, R Xue - Applied Cryptography and Network Security: 5th …, 2007 - Springer
Based on the notion of accumulators, we propose a new cryptographic scheme called
universal accumulators. This scheme enables one to commit to a set of values using a short …

Secure Vickrey auctions without threshold trust

H Lipmaa, N Asokan, V Niemi - … , Bermuda, March 2002 Revised Papers 6, 2003 - Springer
We argue that threshold trust is not an option in most of the real-life electronic auctions. We
then propose two new cryptographic Vickrey auction schemes that involve, apart from the …

A verifiable secret shuffe of homomorphic encryptions

J Groth - International Workshop on Public Key Cryptography, 2002 - Springer
We show how to prove in honest verifier zero-knowledge the correctness of a shuffe of
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …

Balancing accountability and privacy using e-cash

J Camenisch, S Hohenberger… - International conference on …, 2006 - Springer
In an electronic cash (e-cash) system, a user can withdraw coins from the bank, and then
spend each coin anonymously and unlinkably. For some applications, it is desirable to set a …

Accumulating composites and improved group signing

G Tsudik, S Xu - Advances in Cryptology-ASIACRYPT 2003: 9th …, 2003 - Springer
Constructing practical and provably secure group signature schemes has been a very active
research topic in recent years. A group signature can be viewed as a digital signature with …

Distributed paillier cryptosystem without trusted dealer

T Nishide, K Sakurai - … : 11th International Workshop, WISA 2010, Jeju …, 2011 - Springer
We propose a distributed key generation protocol for the threshold Paillier cryptosystem.
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …

Handcuffing big brother: an abuse-resilient transaction escrow scheme

S Jarecki, V Shmatikov - International Conference on the Theory and …, 2004 - Springer
We propose a practical abuse-resilient transaction escrow scheme with applications to
privacy-preserving audit and monitoring of electronic transactions. Our scheme ensures …