Sciweavers

SCN
2010
Springer
101views Communications» more  SCN 2010»
13 years 2 months ago
The impact of key assignment on VANET privacy
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
SCN
2010
Springer
127views Communications» more  SCN 2010»
13 years 2 months ago
Get Shorty via Group Signatures without Encryption
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nige...
SCN
2010
Springer
111views Communications» more  SCN 2010»
13 years 2 months ago
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 2 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 2 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 2 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
SCN
2010
Springer
129views Communications» more  SCN 2010»
13 years 2 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 2 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
SCN
2010
Springer
143views Communications» more  SCN 2010»
13 years 2 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...
SCN
2010
Springer
176views Communications» more  SCN 2010»
13 years 2 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi