Sciweavers

FC
2004
Springer
94views Cryptology» more  FC 2004»
13 years 10 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
FC
2004
Springer
112views Cryptology» more  FC 2004»
13 years 10 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung
FC
2004
Springer
120views Cryptology» more  FC 2004»
13 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
FC
2004
Springer
105views Cryptology» more  FC 2004»
13 years 10 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
FC
2004
Springer
78views Cryptology» more  FC 2004»
13 years 10 months ago
Provable Unlinkability against Traffic Analysis
Ron Berman, Amos Fiat, Amnon Ta-Shma
Cryptology
Top of PageReset Settings