Sciweavers

31 search results - page 3 / 7
» An ID-based authenticated key exchange protocol based on bil...
Sort
View
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 6 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
CEE
2010
66views more  CEE 2010»
13 years 6 months ago
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...
ASIACRYPT
2003
Springer
13 years 10 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
MASS
2010
156views Communications» more  MASS 2010»
13 years 4 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
JUCS
2008
156views more  JUCS 2008»
13 years 6 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng