Sciweavers

2601 search results - page 111 / 521
» Secure Rewarding Schemes
Sort
View
IJNSEC
2006
72views more  IJNSEC 2006»
15 years 3 months ago
Cryptanalysis of Koyama Scheme
In this paper we analyze the security of Koyama scheme based on the singular cubic curve for some well known attacks. We provide an efficient algorithm for linearly related plaint...
Sahadeo Padhye
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 3 months ago
Construction of Dynamic Threshold Decryption Scheme from Pairing
The first dynamic threshold decryption scheme from pairing is presented. It is secure in groups equipped with a bilinear map, and caters to some important requirements in real app...
Yu Long, Kefei Chen
ESORICS
2009
Springer
16 years 3 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
SECON
2007
IEEE
15 years 9 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
INDOCRYPT
2004
Springer
15 years 8 months ago
Separable Linkable Threshold Ring Signatures
A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additional...
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man...