Sciweavers

4529 search results - page 12 / 906
» Position Based Cryptography
Sort
View
SIAMCOMP
2008
103views more  SIAMCOMP 2008»
14 years 11 months ago
Compression in Finite Fields and Torus-Based Cryptography
Abstract. We present efficient compression algorithms for subgroups of multiplicative groups of finite fields, we use our compression algorithms to construct efficient public key c...
Karl Rubin, Alice Silverberg
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 10 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Multi-instance Security and Its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 5 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...