Sciweavers

14 search results - page 2 / 3
» The Twin Diffie-Hellman Problem and Applications
Sort
View
JOC
2010
129views more  JOC 2010»
12 years 11 months ago
Discrete Logarithm Problems with Auxiliary Inputs
Let g be an element of prime order p in an abelian group and let Zp. We show that if g, g , and gd are given for a positive divisor d of p - 1, the secret key can be computed de...
Jung Hee Cheon
JUCS
2008
156views more  JUCS 2008»
13 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
13 years 8 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
MASS
2010
156views Communications» more  MASS 2010»
13 years 2 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
BIB
2000
106views more  BIB 2000»
13 years 4 months ago
Wrapping and Interoperating Bioinformatics Resources Using CORBA
Bioinformaticians seeking to provide services to working biologists are faced with the twin problems of distribution and diversity of resources. Bioinformatics databases are distr...
Robert Stevens, Crispin Miller