Sciweavers

2108 search results - page 165 / 422
» Encrypted
Sort
View
129
Voted
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 10 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
130
Voted
ITNG
2007
IEEE
15 years 10 months ago
An Improved Signcryption Scheme and Its Variation
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. This paper proposes an improved signcryption scheme and a varia...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 9 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 9 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
124
Voted
CCS
2007
ACM
15 years 9 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk