Sciweavers

6 search results - page 1 / 2
» Monotone Signatures
Sort
View
FC
2001
Springer
97views Cryptology» more  FC 2001»
13 years 9 months ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
13 years 10 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
FC
2005
Springer
119views Cryptology» more  FC 2005»
13 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
CIE
2007
Springer
13 years 11 months ago
Hierarchies in Fragments of Monadic Strict NP
We expose a strict hierarchy within monotone monadic strict NP without inequalities (MMSNP), based on the number of second-order monadic quantifiers. We do this by studying a fin...
Barnaby Martin, Florent R. Madelaine
FOSSACS
2005
Springer
13 years 10 months ago
Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
Modal logic has a good claim to being the logic of choice for describing the reactive behaviour of systems modeled as coalgebras. Logics with modal operators obtained from so-calle...
Lutz Schröder