Sciweavers

77 search results - page 11 / 16
» New Fuzzy Identity-Based Encryption in the Standard Model
Sort
View
MICAI
2005
Springer
15 years 3 months ago
Analysis of Performance of Fuzzy Logic-Based Production Scheduling by Simulation
Abstract. In this paper, a new fuzzy logic-based approach to production scheduling in the presence of uncertain disruptions is presented. The approach is applied to a real-life pro...
Alejandra Duenas, Dobrila Petrovic, Sanja Petrovic
CCS
2010
ACM
14 years 9 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
ASIACRYPT
2004
Springer
15 years 2 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
ICALP
2005
Springer
15 years 3 months ago
On Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed ...
Nicholas Hopper