Sciweavers

17 search results - page 4 / 4
» Building Key-Private Public-Key Encryption Schemes
Sort
View
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
13 years 8 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
EUROCRYPT
2003
Springer
13 years 10 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern