Sciweavers

ASIACRYPT
2004
Springer
13 years 10 months ago
Generic Homomorphic Undeniable Signatures
We introduce a new computational problem related to the interpolation of group homomorphisms which generalizes many famous cryptographic problems including discrete logarithm, Di...
Jean Monnerat, Serge Vaudenay
ASIACRYPT
2004
Springer
13 years 10 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
ASIACRYPT
2004
Springer
13 years 10 months ago
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding
Duong Hieu Phan, David Pointcheval
ASIACRYPT
2004
Springer
13 years 10 months ago
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved again...
Tatsuyuki Matsushita, Hideki Imai
ASIACRYPT
2004
Springer
13 years 10 months ago
On the Security of MOR Public Key Cryptosystem
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nah...
ASIACRYPT
2004
Springer
13 years 10 months ago
Higher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
Deukjo Hong, Bart Preneel, Sangjin Lee
ASIACRYPT
2004
Springer
13 years 10 months ago
The Davies-Murphy Power Attack
Sébastien Kunz-Jacques, Frédé...
ASIACRYPT
2004
Springer
13 years 10 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
ASIACRYPT
2004
Springer
13 years 10 months ago
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
Craig Gentry, Zulfikar Ramzan