Sciweavers

Share
ACNS
2007
Springer
87views Cryptology» more  ACNS 2007»
9 years 1 months ago
Privacy-Preserving Set Union
Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14, 6, 21, 9], testing set disjointness [17], multi-set ope...
Keith B. Frikken
ACNS
2007
Springer
96views Cryptology» more  ACNS 2007»
9 years 4 months ago
Universal Accumulators with Efficient Nonmembership Proofs
Based on the notion of accumulators, we propose a new cryptographic scheme called universal accumulators. This scheme enables one to commit to a set of values using a short accumul...
Jiangtao Li, Ninghui Li, Rui Xue
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
9 years 4 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
9 years 6 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
ACNS
2007
Springer
85views Cryptology» more  ACNS 2007»
9 years 6 months ago
Midpoints Versus Endpoints: From Protocols to Firewalls
Diana von Bidder, David A. Basin, Germano Caronni
ACNS
2007
Springer
172views Cryptology» more  ACNS 2007»
9 years 6 months ago
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
In the RSA system, balanced modulus N denotes a product of two large prime numbers p and q, where q < p < 2q. Since IntegerFactorization is difficult, p and q are simply esti...
Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen
ACNS
2007
Springer
147views Cryptology» more  ACNS 2007»
9 years 6 months ago
BAP: Broadcast Authentication Using Cryptographic Puzzles
Patrick Schaller, Srdjan Capkun, David A. Basin
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
9 years 6 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
9 years 6 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
9 years 6 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
books