Sciweavers

2601 search results - page 199 / 521
» Secure Rewarding Schemes
Sort
View
ITNG
2006
IEEE
15 years 9 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
VTS
1999
IEEE
100views Hardware» more  VTS 1999»
15 years 7 months ago
Low-Cost On-Line Test for Digital Filters
A low-cost on-line test scheme for digital filters is proposed. The scheme uses an invariant of the digital filter, the frequency response at specific points, in order to detect p...
Ismet Bayraktaroglu, Alex Orailoglu
149
Voted
ASIACRYPT
1992
Springer
15 years 7 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
157
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Short Signatures from the Weil Pairing
Abstract. We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the...
Dan Boneh, Ben Lynn, Hovav Shacham
139
Voted
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu