167
click to vote
CTRSA
15 years 6 months ago
2006 Springer
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
133
click to vote
CTRSA
15 years 6 months ago
2006 Springer
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
120
click to vote
CTRSA
15 years 6 months ago
2006 Springer
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
123
click to vote
CTRSA
15 years 6 months ago
2006 Springer
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
127
click to vote
CTRSA
15 years 6 months ago
2006 Springer
We construct efficient universally composable oblivious transfer protocols in the multi-party setting for honest majorities. Unlike previous proposals our protocols are designed in...
|