Sciweavers

1834 search results - page 121 / 367
» Public Key Cryptography
Sort
View
PKC
2010
Springer
193views Cryptology» more  PKC 2010»
15 years 3 months ago
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic s...
Nigel P. Smart, Frederik Vercauteren
IJNSEC
2008
152views more  IJNSEC 2008»
14 years 11 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
CORR
2011
Springer
186views Education» more  CORR 2011»
14 years 6 months ago
Key Reduction of McEliece's Cryptosystem Using List Decoding
Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Morgan Barbier
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
15 years 3 months ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...
COMCOM
1999
107views more  COMCOM 1999»
14 years 11 months ago
A formalisation and evaluation of certificate policies
Certificate policies play a central role in public key infrastructures, since they are the basis for the evaluation of trust in binding between a key and a subject in a public key...
Tomaz Klobucar, Borka Jerman-Blazic