Sciweavers

SCN
2004
Springer
121views Communications» more  SCN 2004»
13 years 10 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
SCN
2004
Springer
13 years 10 months ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
SCN
2004
Springer
102views Communications» more  SCN 2004»
13 years 10 months ago
On the Size of Monotone Span Programs
Abstract. Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
SCN
2004
Springer
13 years 10 months ago
Identity-Based Zero Knowledge
Abstract. We introduce and define the notion of identity-based zeroknowledge, concentrating on the non-interactive setting. In this setting, our notion allows any prover to widely...
Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin
SCN
2004
Springer
112views Communications» more  SCN 2004»
13 years 10 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
SCN
2004
Springer
123views Communications» more  SCN 2004»
13 years 10 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros