Learn More
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors [7] to generate(More)
Traditionally, the emphasis among computer scientists has been on the more rigorous and theoretical modes of worst-case and average-case analysis of algorithms. However, theoretical analysis cannot tell the full story about real-world performance of algorithms. This has resulted in a growing interest in experimental analysis. This paper presents the(More)
Traditionally, the emphasis among computer scientists has been on the more rigorous and theoretical modes of worst-case and average-case analysis of algorithms. However, theoretical analysis cannot tell the full story about real-world performance of algorithms. This has resulted in a growing interest in experimental analysis. This paper presents the(More)
Traditionally, the emphasis among computer scientists has been on the more rigorous and theoretical modes of worst-case and average-case analysis of algorithms. However, theoretical analysis cannot tell the full story about real-world performance of algorithms. This has resulted in a growing interest in experimental analysis. This paper presents the(More)
  • 1