Sciweavers

1769 search results - page 134 / 354
» Cryptography
Sort
View
114
Voted
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
15 years 9 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo
146
Voted
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
15 years 9 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
PKC
2007
Springer
99views Cryptology» more  PKC 2007»
15 years 9 months ago
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
We give a short constant-size group signature scheme, which we prove fully secure under reasonable assumptions in bilinear groups, in the standard model. We achieve this result by ...
Xavier Boyen, Brent Waters
116
Voted
PKC
2007
Springer
132views Cryptology» more  PKC 2007»
15 years 9 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
SSC
2007
Springer
147views Cryptology» more  SSC 2007»
15 years 9 months ago
Remarks on a Sequence of Minimal Niven Numbers
In this short note we introduce two new sequences defined using the sum of digits in the representation of an integer in a certain base. A connection to Niven numbers is proposed ...
H. Fredricksen, E. J. Ionascu, Florian Luca, Pante...