Sciweavers

16 search results - page 2 / 4
» pkc 2000
Sort
View
PKC
2000
Springer
107views Cryptology» more  PKC 2000»
13 years 8 months ago
Some Remarks on a Fair Exchange Protocol
Fair exchange turns out to be an increasingly importanttopic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each...
Jianying Zhou, Robert H. Deng, Feng Bao
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 7 months ago
Security of Blind Signatures Revisited
We revisit the deļ¬nition of unforgeability of blind signatures as proposed by Pointcheval and Stern (Journal of Cryptology 2000). Surprisingly, we show that this established deļ¬...
Dominique Schröder, Dominique Unruh
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
13 years 8 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
13 years 8 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
13 years 8 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon