Sciweavers

199 search results - page 9 / 40
» Adaptive Proofs of Knowledge in the Random Oracle Model
Sort
View
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 6 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
ISF
2000
103views more  ISF 2000»
14 years 11 months ago
Oracles, Bards, and Village Gossips, or Social Roles and Meta Knowledge Management
Knowledge management systems are used widely in many different organizations, yet there are few models and theories which can be used to help introduce and apply them successfully....
Simon Masterton, Stuart Watt
ASIACRYPT
2010
Springer
14 years 9 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...
ISW
2007
Springer
15 years 5 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 3 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter