Sciweavers

PKC
2001
Springer
116views Cryptology» more  PKC 2001»
13 years 9 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
13 years 9 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval
PKC
2001
Springer
163views Cryptology» more  PKC 2001»
13 years 9 months ago
Fast Irreducibility and Subgroup Membership Testing in XTR
Abstract. We describe a new general method to perform part of the setup stage of the XTR system introduced at Crypto 2000, namely finding the trace of a generator of the XTR group...
Arjen K. Lenstra, Eric R. Verheul
PKC
2001
Springer
111views Cryptology» more  PKC 2001»
13 years 9 months ago
Cryptanalysis of PKP: A New Approach
Quite recently, in [4], a new time-memory tradeoff algorithm was presented. The original goal of this algorithm was to count the number of points on an elliptic curve, however, th...
Éliane Jaulmes, Antoine Joux
PKC
2001
Springer
107views Cryptology» more  PKC 2001»
13 years 9 months ago
Efficient Revocation in Group Signatures
Emmanuel Bresson, Jacques Stern
PKC
2001
Springer
86views Cryptology» more  PKC 2001»
13 years 9 months ago
One Round Threshold Discrete-Log Key Generation without Private Channels
Pedersen designed the first scheme for generating Discrete-Log keys without
Pierre-Alain Fouque, Jacques Stern