Sciweavers

2601 search results - page 113 / 521
» Secure Rewarding Schemes
Sort
View
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 10 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
EUROCRYPT
2001
Springer
15 years 7 months ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
AMC
2005
124views more  AMC 2005»
15 years 3 months ago
An efficient undeniable group-oriented signature scheme
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 9 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer