Sciweavers

4340 search results - page 222 / 868
» Formal Methods and Cryptography
Sort
View
129
Voted
IWSEC
2007
Springer
15 years 11 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 11 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 10 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...