Sciweavers

5891 search results - page 15 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
SASN
2005
ACM
15 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
73
Voted
ICITS
2009
14 years 7 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
15 years 2 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
JNW
2006
174views more  JNW 2006»
14 years 9 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
FI
2011
96views more  FI 2011»
14 years 4 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...