Sciweavers

FC
2007
Springer
105views Cryptology» more  FC 2007»
13 years 7 months ago
Space-Efficient Private Search with Applications to Rateless Codes
Abstract. Private keyword search is a technique that allows for searching and retrieving documents matching certain keywords without revealing the search criteria. We improve the s...
George Danezis, Claudia Díaz
FC
2007
Springer
147views Cryptology» more  FC 2007»
13 years 7 months ago
Certificate Revocation Using Fine Grained Certificate Space Partitioning
A new certificate revocation system is presented. The basic idea is to divide the certificate space into several partitions, the number of partitions being dependent on the PKI en...
Vipul Goyal
FC
2007
Springer
128views Cryptology» more  FC 2007»
13 years 9 months ago
On Authentication with HMAC and Non-random Properties
Abstract. MAC algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial appli
Christian Rechberger, Vincent Rijmen
FC
2007
Springer
128views Cryptology» more  FC 2007»
13 years 9 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
FC
2007
Springer
121views Cryptology» more  FC 2007»
13 years 9 months ago
Virtual Economies: Threats and Risks
Christopher Thorpe, Jessica Hammer, Jean Camp, Jon...
FC
2007
Springer
113views Cryptology» more  FC 2007»
13 years 9 months ago
Vulnerabilities in First-Generation RFID-enabled Credit Cards
Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin ...
FC
2007
Springer
111views Cryptology» more  FC 2007»
13 years 9 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
FC
2007
Springer
125views Cryptology» more  FC 2007»
13 years 9 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
FC
2007
Springer
158views Cryptology» more  FC 2007»
13 years 9 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
FC
2007
Springer
151views Cryptology» more  FC 2007»
13 years 9 months ago
Conditional E-Cash
Abstract. We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. P...
Larry Shi, Bogdan Carbunar, Radu Sion