Sciweavers

524 search results - page 20 / 105
» On the Security of the DeKaRT Primitive
Sort
View
98
Voted
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 6 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
128
Voted
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 5 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
109
Voted
ESORICS
2008
Springer
15 years 3 months ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 1 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
ESORICS
2012
Springer
13 years 4 months ago
Unique Group Signatures
We initiate the study of unique group signature such that signatures of the same message by the same user will always have a large common component (i.e., unique identifier). It ...
Matthew K. Franklin, Haibin Zhang