Sciweavers

405 search results - page 3 / 81
» Practice-Oriented Provable Security
Sort
View
CCS
2001
ACM
13 years 10 months ago
Provably authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
ACISP
2006
Springer
13 years 9 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao
ATAL
2007
Springer
13 years 10 months ago
Towards provably secure trust and reputation systems in e-marketplaces
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Reid Kerr, Robin Cohen
CCS
2007
ACM
14 years 4 days ago
Provable data possession at untrusted stores
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
ASIACRYPT
2004
Springer
13 years 11 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera