Sciweavers

405 search results - page 3 / 81
» Practice-Oriented Provable Security
Sort
View
CCS
2001
ACM
15 years 4 months ago
Provably authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
ACISP
2006
Springer
15 years 3 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao
ATAL
2007
Springer
15 years 4 months ago
Towards provably secure trust and reputation systems in e-marketplaces
In this paper, we present a framework for evaluating the security of trust and reputation systems for electronic marketplaces populated with buying and selling agents. Our propose...
Reid Kerr, Robin Cohen
78
Voted
CCS
2007
ACM
15 years 6 months ago
Provable data possession at untrusted stores
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
75
Voted
ASIACRYPT
2004
Springer
15 years 5 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera