Sciweavers

610 search results - page 61 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
IC
2004
15 years 1 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
EUROCRYPT
2010
Springer
15 years 4 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
ASIACRYPT
2006
Springer
15 years 3 months ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
IWSEC
2009
Springer
15 years 6 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
15 years 6 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud