Sciweavers

AMC
2005
138views more  AMC 2005»
13 years 4 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 4 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
SCN
2008
Springer
13 years 4 months ago
Linear Bandwidth Naccache-Stern Encryption
Abstract. The Naccache-Stern (ns) knapsack cryptosystem is an original yet little-known public-key encryption scheme. In this scheme, the ciphertext is obtained by multiplying publ...
Benoît Chevallier-Mames, David Naccache, Jac...
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 4 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
IJSN
2006
123views more  IJSN 2006»
13 years 4 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
IJNSEC
2008
91views more  IJNSEC 2008»
13 years 4 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IJNSEC
2008
147views more  IJNSEC 2008»
13 years 4 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
13 years 4 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
CORR
2008
Springer
63views Education» more  CORR 2008»
13 years 4 months ago
A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Abstract
Danilo Gligoroski, Smile Markovski, Svein J. Knaps...