Sciweavers

76 search results - page 9 / 16
» Confirmer Signature Schemes Secure against Adaptive Adversar...
Sort
View
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 9 days ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 6 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
AFRICACRYPT
2009
Springer
15 years 3 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
14 years 11 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...