We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
In a practical system, a message is often encrypted more than once by diļ¬erent encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
In this paper, the problem of deriving sensible information from a collection of argumentation systems coming from diļ¬erent agents is addressed. The underlying argumentation the...