Sciweavers

4 search results - page 1 / 1
» icisc 2000
Sort
View
ICISC
2000
73views Cryptology» more  ICISC 2000»
13 years 6 months ago
A Multi-party Optimistic Non-repudiation Protocol
In this paper we consider the optimistic approach of the non-repudiation protocols. We study a non-repudiation protocol with off-line trusted third party and we keep on with the de...
Olivier Markowitch, Steve Kremer
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 6 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 6 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
ICICS
2003
Springer
13 years 10 months ago
Security Remarks on a Group Signature Scheme with Member Deletion
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...