Sciweavers

3145 search results - page 8 / 629
» Key Improvements to XTR
Sort
View
EUROCRYPT
2012
Springer
13 years 3 months ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...
135
Voted
IWDC
2005
Springer
128views Communications» more  IWDC 2005»
15 years 6 months ago
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment conï...
Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatr...
88
Voted
SCN
2010
Springer
138views Communications» more  SCN 2010»
14 years 11 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
148
Voted
TIFS
2010
184views more  TIFS 2010»
14 years 11 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
106
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 10 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano