148
click to vote
ACNS
15 years 7 months ago
2006 Springer
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
146
click to vote
ACNS
15 years 7 months ago
2006 Springer
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
151
click to vote
ACNS
15 years 7 months ago
2006 Springer
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
120
click to vote
ACNS
15 years 7 months ago
2006 Springer
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
129
click to vote
ACNS
15 years 9 months ago
2006 Springer
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
|