Sciweavers

2108 search results - page 44 / 422
» Encrypted
Sort
View
118
Voted
ARTCOM
2009
IEEE
15 years 7 months ago
Sender-Side Public Key Deniable Encryption Scheme
— Consider a situation in which the transmission of encrypted message is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secre...
Jaydeep Howlader, Saikat Basu
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ACNS
2008
Springer
252views Cryptology» more  ACNS 2008»
15 years 7 months ago
Generic Constructions of Stateful Public Key Encryption and Their Applications
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new ...
Joonsang Baek, Jianying Zhou, Feng Bao
75
Voted
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
15 years 7 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua