209
click to vote
CRYPTO
15 years 5 months ago
2004 Springer
In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, intro...
103
click to vote
CRYPTO
15 years 5 months ago
2004 Springer
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
102
click to vote
CRYPTO
15 years 5 months ago
2004 Springer
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
101
click to vote
CRYPTO
15 years 5 months ago
2004 Springer
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
100
click to vote
CRYPTO
15 years 5 months ago
2004 Springer
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
|