Sciweavers

2601 search results - page 39 / 521
» Secure Rewarding Schemes
Sort
View
INDOCRYPT
2003
Springer
15 years 5 months ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 1 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
ITCC
2000
IEEE
15 years 4 months ago
Simple Collusion-Secure Fingerprinting Schemes for Images
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to ...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...
INDOCRYPT
2004
Springer
15 years 5 months ago
A Provably Secure Elliptic Curve Scheme with Fast Encryption
Abstract. We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n2...
David Galindo, Sebastià Martín Molle...
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
14 years 11 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu