Sciweavers

64 search results - page 4 / 13
» Practical unconditionally secure two-channel message authent...
Sort
View
73
Voted
SCN
2010
Springer
147views Communications» more  SCN 2010»
14 years 8 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
IACR
2011
73views more  IACR 2011»
13 years 9 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
15 years 2 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
15 years 1 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg