Sciweavers

1058 search results - page 63 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 4 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
103
Voted
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 18 days ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
EUROCRYPT
2008
Springer
15 years 2 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
104
Voted
SCN
2010
Springer
145views Communications» more  SCN 2010»
14 years 11 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
107
Voted
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 6 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik