Sciweavers

299 search results - page 2 / 60
» Deniable Authentication on the Internet
Sort
View
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
14 years 5 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
IMCS
2010
116views more  IMCS 2010»
13 years 2 months ago
Assessing and Improving Authentication Confidence Management
Purpose
Michael Pearce, Sherali Zeadally, Ray Hunt
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
13 years 9 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
13 years 9 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
WPES
2004
ACM
13 years 10 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer