Sciweavers

15 search results - page 3 / 3
» pkc 1999
Sort
View
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
13 years 9 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
13 years 9 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
13 years 9 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
11 years 7 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
PKC
1999
Springer
115views Cryptology» more  PKC 1999»
13 years 9 months ago
Decision Oracles are Equivalent to Matching Oracles
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the effort to classify related but seemingly distinct notions. Separa...
Helena Handschuh, Yiannis Tsiounis, Moti Yung