138
click to vote
ASIACRYPT
15 years 3 months ago
2004 Springer
We propose a public-key traitor tracing scheme in which (1) the size of a ciphertext is sublinear in the number of receivers and (2) black-box tracing is efficiently achieved again...
113
click to vote
ASIACRYPT
15 years 1 months ago
2004 Springer
Group signature schemes are cryptographic systems that provide revocable anonymity for signers. We propose a group signature scheme with constant-size public key and signature leng...
105
click to vote
ASIACRYPT
15 years 3 months ago
2004 Springer
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
ASIACRYPT
15 years 3 months ago
2004 Springer
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
ASIACRYPT
15 years 3 months ago
2004 Springer
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
|