Sciweavers

1834 search results - page 45 / 367
» Public Key Cryptography
Sort
View
135
Voted
ACMICEC
2006
ACM
117views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Practical secrecy-preserving, verifiably correct and trustworthy auctions
We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the an...
David C. Parkes, Michael O. Rabin, Stuart M. Shieb...
127
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Cryptanalysis of the Sidelnikov Cryptosystem
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...
Lorenz Minder, Amin Shokrollahi
124
Voted
EUROCRYPT
2005
Springer
15 years 9 months ago
3-Move Undeniable Signature Scheme
In undeniable signature schemes, zero-knowledgeness and non-transferability have been identified so far. In this paper, by separating these two notions, we show the first 3-move ...
Kaoru Kurosawa, Swee-Huay Heng
100
Voted
IMA
2009
Springer
136views Cryptology» more  IMA 2009»
15 years 10 months ago
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Hao Chen, San Ling, Carles Padró, Huaxiong ...
133
Voted
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 3 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal