Sciweavers

345 search results - page 51 / 69
» Reverse Public Key Encryption
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
EG
2007
126views more  EG 2007»
14 years 9 months ago
E-government: an e-reverse auction case study
This paper presents the findings from an exploratory in-depth case study with regard to eReverse Auctions (eRAs) in the UK public sector. These findings highlight that eRAs can im...
Steve Jones, Ray Hackney, Zahir Irani
USENIX
2007
14 years 11 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
JOC
2010
82views more  JOC 2010»
14 years 4 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel