Sciweavers

334 search results - page 27 / 67
» Public Key Encryption for the Forgetful
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 6 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
EUROPKI
2004
Springer
15 years 7 months ago
Using LDAP Directories for Management of PKI Processes
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP server...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 7 months ago
SOTIP as a Model for Outsourcing of Telecom Services for the Public Sector
The political intentions for the past 20 years have broadly speaking been to reduce the number of publicly owned and publicly run activities. Outsourcing is an often applied way t...
Helena Lindskog
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
15 years 7 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
CCS
2008
ACM
15 years 3 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar