Sciweavers

121 search results - page 18 / 25
» A Ring Signature Scheme Using Bilinear Pairings
Sort
View
EUROCRYPT
2004
Springer
15 years 2 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
CORR
2007
Springer
122views Education» more  CORR 2007»
14 years 10 months ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
ASIACRYPT
2003
Springer
15 years 2 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
IJSNET
2006
78views more  IJSNET 2006»
14 years 10 months ago
RICA: a ring-based information collection architecture in wireless sensor networks
: We propose a novel data collection architecture, called Ring-based Information Collection Architecture (RICA), for sensor networks. In the RICA scheme, sensors are organised into...
Shih-Chang Huang, Rong-Hong Jan, Wuu Yang
NDSS
2000
IEEE
15 years 3 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin