Sciweavers

13 search results - page 2 / 3
» ima 2001
Sort
View
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
13 years 9 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
13 years 9 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
IMA
2001
Springer
90views Cryptology» more  IMA 2001»
13 years 9 months ago
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperabi...
Konstantinos Rantos, Chris J. Mitchell
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
13 years 9 months ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
IMA
2001
Springer
80views Cryptology» more  IMA 2001»
13 years 9 months ago
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement
A recursive construction is provided for sequence sets which possess good Hamming Distance and low Peak-to-Average Power Ratio (PAR) under any Local Unitary Unimodular Transform. W...
Matthew G. Parker