A performance evaluation of local descriptors
K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 18 …, 2002 - Springer
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …
hash a large set of inputs into one short value, such that there is a short proof that a given …
Compact e-cash
J Camenisch, S Hohenberger… - … Conference on the Theory …, 2005 - Springer
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
Universal accumulators with efficient nonmembership proofs
J Li, N Li, R Xue - Applied Cryptography and Network Security: 5th …, 2007 - Springer
Based on the notion of accumulators, we propose a new cryptographic scheme called
universal accumulators. This scheme enables one to commit to a set of values using a short …
universal accumulators. This scheme enables one to commit to a set of values using a short …
Secure Vickrey auctions without threshold trust
We argue that threshold trust is not an option in most of the real-life electronic auctions. We
then propose two new cryptographic Vickrey auction schemes that involve, apart from the …
then propose two new cryptographic Vickrey auction schemes that involve, apart from the …
A verifiable secret shuffe of homomorphic encryptions
J Groth - International Workshop on Public Key Cryptography, 2002 - Springer
We show how to prove in honest verifier zero-knowledge the correctness of a shuffe of
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …
Balancing accountability and privacy using e-cash
J Camenisch, S Hohenberger… - International conference on …, 2006 - Springer
In an electronic cash (e-cash) system, a user can withdraw coins from the bank, and then
spend each coin anonymously and unlinkably. For some applications, it is desirable to set a …
spend each coin anonymously and unlinkably. For some applications, it is desirable to set a …
Accumulating composites and improved group signing
Constructing practical and provably secure group signature schemes has been a very active
research topic in recent years. A group signature can be viewed as a digital signature with …
research topic in recent years. A group signature can be viewed as a digital signature with …
Distributed paillier cryptosystem without trusted dealer
T Nishide, K Sakurai - … : 11th International Workshop, WISA 2010, Jeju …, 2011 - Springer
We propose a distributed key generation protocol for the threshold Paillier cryptosystem.
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …
Handcuffing big brother: an abuse-resilient transaction escrow scheme
S Jarecki, V Shmatikov - International Conference on the Theory and …, 2004 - Springer
We propose a practical abuse-resilient transaction escrow scheme with applications to
privacy-preserving audit and monitoring of electronic transactions. Our scheme ensures …
privacy-preserving audit and monitoring of electronic transactions. Our scheme ensures …