Sciweavers

54 search results - page 9 / 11
» Solutions to Key Exposure Problem in Ring Signature
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
13 years 11 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
13 years 11 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarin...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
CCS
2008
ACM
13 years 7 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
CARDIS
2004
Springer
149views Hardware» more  CARDIS 2004»
13 years 11 months ago
Checking and Signing XML Documents on Java Smart Cards
: One major challenge for digitally signing a document is the so called “what you see is what you sign” problem. XML as a meta language for encoding semistructured data offers ...
Nils Gruschka, Florian Reuter, Norbert Luttenberge...
MMS
1998
13 years 5 months ago
A Comparison of Reliable Multicast Protocols
We analyze the maximum throughput that known classes of reliable multicast transport protocols can attain. A new taxonomy of reliable multicast transport protocols is introduced ba...
Brian Neil Levine, J. J. Garcia-Luna-Aceves