Sciweavers

IAJIT
2016
45views Biometrics» more  IAJIT 2016»
8 years 22 days ago
Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing
: To plan and improve a fuzzy logic and neural network based trust and reputation model for safe resource allocation in cloud computing is the most important motto of this research...
Kamalanathan Chandran, Valarmathy Shanmugasudaram,...
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 23 days ago
OPFE: Outsourcing Computation for Private Function Evaluation
Outsourcing secure multiparty computation (SMC) protocols has allowed resource-constrained devices to take advantage of these developing cryptographic primitives with great effici...
Henry Carter, Patrick Traynor
IACR
2016
51views Biometrics» more  IACR 2016»
8 years 23 days ago
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Abstract. Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft’s Active Directory and shipped with ...
Jörg Schwenk
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 23 days ago
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
The task of finding a constructive approximation in the computational distance, while simultaneously preserving additional constrains (referred to as "simulators"), app...
Maciej Skórski
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 23 days ago
A note on Tensor Simple Matrix Encryption Scheme
The simple matrix encryption scheme (Tao-Diene-Tang-Ding, PQCrypto 2013) has a problem of decryption failures. Quite recently, Petzoldt-Ding-Wang (http://eprint.iacr. org/2016/010...
Yasufumi Hashimoto
IACR
2016
52views Biometrics» more  IACR 2016»
8 years 23 days ago
Robust Password-Protected Secret Sharing
Abstract. Password-protected secret sharing (PPSS) schemes allow a user to publicly share this highentropy secret across different servers and to later recover it by interacting w...
Michel Abdalla, Mario Cornejo, Anca Nitulescu, Dav...
IACR
2016
48views Biometrics» more  IACR 2016»
8 years 23 days ago
Proofs of Space-Time and Rational Proofs of Storage
Abstract. We introduce a new cryptographic primitive: Proofs of SpaceTime (PoSTs) and construct a practical protocol for implementing these proofs. A PoST allows a prover to convin...
Tal Moran, Ilan Orlov
IACR
2016
59views Biometrics» more  IACR 2016»
8 years 23 days ago
Access Control Encryption: Enforcing Information Flow with Cryptography
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users ...
Ivan Damgård, Helene Haagh, Claudio Orlandi
IACR
2016
47views Biometrics» more  IACR 2016»
8 years 23 days ago
Commutativity, Associativity, and Public Key Cryptography
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or w...
Jacques Patarin, Valérie Nachef
IACR
2016
39views Biometrics» more  IACR 2016»
8 years 23 days ago
How to Generalize RSA Cryptanalyses
Recently, the security of RSA variants with moduli N = pr q, e.g., the Takagi RSA and the prime power RSA, have been actively studied in several papers. Due to the unusual composit...
Atsushi Takayasu, Noboru Kunihiro