Sciweavers

2967 search results - page 435 / 594
» Cryptology
Sort
View
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both...
Dan Boneh, Craig Gentry, Brent Waters
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
CRYPTO
2005
Springer
104views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
On the Discrete Logarithm Problem on Algebraic Tori
Abstract. Using a recent idea of Gaudry and exploiting rational representations of algebraic tori, we present an index calculus type algorithm for solving the discrete logarithm pr...
Robert Granger, Frederik Vercauteren
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 11 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger