Sciweavers

5891 search results - page 103 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IPPS
2003
IEEE
15 years 6 months ago
Secret Key Cryptography with Cellular Automata
The paper presents new results concerning application of cellular automata (CAs) to the secret key cryptography
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
ICDCS
2005
IEEE
15 years 7 months ago
Distributed Blinding for Distributed ElGamal Re-Encryption
A protocol is given to take an ElGamal ciphertext encrypted under the key of one distributed service and produce the corresponding ciphertext encrypted under the key of another di...
Lidong Zhou, Michael A. Marsh, Fred B. Schneider, ...
ACSAC
2009
IEEE
15 years 8 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
ICCSA
2007
Springer
15 years 7 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
POLICY
2007
Springer
15 years 7 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell