Sciweavers

349 search results - page 54 / 70
» Compositional Security for Task-PIOAs
Sort
View
72
Voted
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser
76
Voted
DCC
2005
IEEE
15 years 9 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
67
Voted
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 4 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
CSFW
2005
IEEE
15 years 3 months ago
Belief in Information Flow
To reason about information flow based on beliefs, a new model is developed that describes how attacker beliefs change due to the attacker’s observation of the execution of a p...
Michael R. Clarkson, Andrew C. Myers, Fred B. Schn...