120
click to vote
EUROCRYPT
15 years 3 months ago
2004 Springer
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
115
click to vote
EUROCRYPT
15 years 5 months ago
2004 Springer
We prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager for rekeying the group are obtained by arbitra...
114
click to vote
EUROCRYPT
15 years 5 months ago
2004 Springer
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
111
click to vote
EUROCRYPT
15 years 5 months ago
2004 Springer
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
110
Voted
EUROCRYPT
15 years 5 months ago
2004 Springer
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
|