183
click to vote
ASIACRYPT
15 years 5 months ago
2006 Springer
We introduce a primitive called Hierarchical Identity-Coupling Broadcast Encryption (HICBE) that can be used for constructing efficient collusion-resistant public-key broadcast enc...
124
click to vote
ASIACRYPT
15 years 7 months ago
2006 Springer
Abstract. The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suit...
118
click to vote
ASIACRYPT
15 years 7 months ago
2006 Springer
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
127
click to vote
ASIACRYPT
15 years 7 months ago
2006 Springer
The group signature scheme [1], ACJT for short, is popular. In this paper we show that it is not secure. It does not satisfy exculpability. The group manager can sign on behalf of ...
104
click to vote
ASIACRYPT
15 years 7 months ago
2006 Springer
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
|