Sciweavers

PKC
2007
Springer
132views Cryptology» more  PKC 2007»
13 years 9 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
PKC
2007
Springer
100views Cryptology» more  PKC 2007»
13 years 9 months ago
Multi-bit Cryptosystems Based on Lattice Problems
Abstract. We propose multi-bit versions of several single-bit cryptosystems based on lattice problems, the error-free version of the Ajtai-Dwork cryptosystem by Goldreich, Goldwass...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
13 years 9 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
13 years 9 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
13 years 9 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
13 years 9 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
PKC
2007
Springer
151views Cryptology» more  PKC 2007»
13 years 9 months ago
Cryptanalysis of HFE with Internal Perturbation
Abstract. Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the bas...
Vivien Dubois, Louis Granboulan, Jacques Stern
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
13 years 9 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
13 years 9 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
PKC
2007
Springer
105views Cryptology» more  PKC 2007»
13 years 9 months ago
Improved On-Line/Off-Line Threshold Signatures
Emmanuel Bresson, Dario Catalano, Rosario Gennaro