Sciweavers

Share
8 search results - page 1 / 2
» How to Enhance the Security of Public-Key Encryption at Mini...
Sort
View
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
9 years 8 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and eļ¬ƒcient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
ASIACRYPT
2008
Springer
9 years 5 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
9 years 10 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
ASIACRYPT
2001
Springer
9 years 8 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
EUROPKI
2006
Springer
9 years 7 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
books