Sciweavers

21 search results - page 3 / 5
» A Provably Secure Elliptic Curve Scheme with Fast Encryption
Sort
View
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 10 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
13 years 11 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 10 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
WCNC
2008
IEEE
14 years 19 days ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 6 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...