Sciweavers

5891 search results - page 26 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CTRSA
2001
Springer
109views Cryptology» more  CTRSA 2001»
15 years 10 months ago
Uncheatable Distributed Computations
Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Intern...
Philippe Golle, Ilya Mironov
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 6 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
WMCSA
2008
IEEE
15 years 11 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
CCS
2010
ACM
15 years 6 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
IEEEARES
2007
IEEE
15 years 11 months ago
Universally Composable Three-Party Key Distribution
—In this paper, we formulate and realize a definition of security for three-party key distribution within the universally composable (UC) framework. That is, an appropriate ideal...
TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang