Sciweavers

2601 search results - page 140 / 521
» Secure Rewarding Schemes
Sort
View
MUE
2007
IEEE
113views Multimedia» more  MUE 2007»
15 years 9 months ago
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo de...
Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
IJNSEC
2008
85views more  IJNSEC 2008»
15 years 3 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
121
Voted
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
15 years 1 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CCS
2006
ACM
15 years 7 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...
CRYPTO
2001
Springer
113views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
OAEP Reconsidered
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widel...
Victor Shoup