Sciweavers

1769 search results - page 207 / 354
» Cryptography
Sort
View
135
Voted
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 3 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
DAM
2006
102views more  DAM 2006»
15 years 3 months ago
Secret sharing schemes on access structures with intersection number equal to one
The characterization of ideal access structures and the search for bounds on the optimal information rate are two important problems in secret sharing. These problems are studied ...
Jaume Martí-Farré, Carles Padr&oacut...
ECCC
2006
88views more  ECCC 2006»
15 years 3 months ago
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Abstract. This article points out a gap between two natural formulations of the concept of a proof of knowledge, and shows that in all natural cases (e.g., NP-statements) this gap ...
Mihir Bellare, Oded Goldreich
IJNSEC
2008
92views more  IJNSEC 2008»
15 years 3 months ago
Re-visiting the One-Time Pad
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system (One-Time Pad or OTP). It has generally been believed that the perfectly random and uncompressible O...
Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya
153
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 3 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen