Search results for "Digital signature"

showing 5 items of 5 documents

If P≠NP then some strongly noninvertible functions are invertible

2006

AbstractRabi, Rivest, and Sherman alter the standard notion of noninvertibility to a new notion they call strong noninvertibility, and show—via explicit cryptographic protocols for secret-key agreement (Rabi and Sherman attribute this protocol to Rivest and Sherman) and digital signatures (Rabi and Sherman)—that strongly noninvertible functions are very useful components in protocol design. Their definition of strong noninvertibility has a small twist (“respecting the argument given”) that is needed to ensure cryptographic usefulness. In this paper, we show that this small twist has a consequence: unless P=NP, some strongly noninvertible functions are invertible.

Discrete mathematicsGeneral Computer ScienceComputational complexity theorybusiness.industryP versus NP problemOne-way functionsCryptographyOne-way functionCryptographic protocolTheoretical Computer Sciencelaw.inventionComputational complexityInvertible matrixDigital signaturelawAssociativityCryptographyStrong noninvertibilitybusinessAssociative propertyMathematicsTheoretical Computer Science
researchProduct

The Public-Key-Infrastructure of the Radiological Society of Germany.

2005

Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…

Teleradiologybusiness.industryPublic key infrastructureGeneral MedicineCertificationTrusted third partyComputer securitycomputer.software_genreElectronic signatureDigital signatureGermanyCertificate authorityMedicineHumansRadiology Nuclear Medicine and imagingThe InternetKey serverbusinessSocietiescomputerAlgorithmsComputer SecurityConfidentialitySoftwareEuropean journal of radiology
researchProduct

Face Expression Recognition through Broken Symmetries

2008

Security systems, criminology, physical access control and man-machine interactions are examples of applications where recognition of human faces may be crucial. In the present paper a new signature, based on a measure of axial symmetry called DST, is proposed as a significant feature to analyze facial expressions. The measure of symmetry is an elaborate difference between the internal and external symmetry kernels of an object. The idea here is to use the evolution of the symmetry measure of a face over an ordered set of its sub-images. We claim that different evolutionary trends will represent different face expressions. The proposed signature has been tested on several face databases (ps…

Settore INF/01 - Informaticabusiness.industryComputer sciencePattern recognitionFacial recognition systemMeasure (mathematics)Face Expression RecognitionExpression (mathematics)SymmetryDigital signatureFace (geometry)Feature (machine learning)Computer visionArtificial intelligenceSymmetry (geometry)businessAxial symmetry
researchProduct

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct

2020

Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…

020203 distributed computingComputer sciencemedia_common.quotation_subject02 engineering and technologyConstruct (python library)RedactionComputer securitycomputer.software_genreDigital signatureOrder (exchange)020204 information systemsVoting0202 electrical engineering electronic engineering information engineeringFork (file system)Protocol (object-oriented programming)computerPrivate information retrievalmedia_common
researchProduct

If P ≠ NP then Some Strongly Noninvertible Functions Are Invertible

2001

Rabi, Rivest, and Sherman alter the standard notion of noninvertibility to a new notion they call strong noninvertibility, and show--via explicit cryptographic protocols for secret-key agreement ([RS93, RS97] attribute this to Rivest and Sherman) and digital signatures [RS93, RS97]--that strongly noninvertible functions would be very useful components in protocol design. Their definition of strong noninvertibility has a small twist ("respecting the argument given") that is needed to ensure cryptographic usefulness. In this paper, we show that this small twist has a large, unexpected consequence: Unless P = NP, some strongly noninvertible functions are invertible.

Discrete mathematicsComputational complexity theorybusiness.industryP versus NP problemCryptographyCryptographic protocollaw.inventionInvertible matrixDigital signaturelawTwistbusinessTime complexityMathematics
researchProduct