Sciweavers

2601 search results - page 92 / 521
» Secure Rewarding Schemes
Sort
View
ADHOCNOW
2006
Springer
15 years 9 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
IJNSEC
2011
239views more  IJNSEC 2011»
14 years 10 months ago
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information a...
R. Rajaram Ramasamy, M. Amutha Prabakar
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
13 years 5 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
FFA
2006
79views more  FFA 2006»
15 years 3 months ago
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the deal...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
15 years 9 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert