Sciweavers

369 search results - page 32 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
ICOIN
2007
Springer
15 years 6 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
CCS
2003
ACM
15 years 5 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 4 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
CSFW
2010
IEEE
15 years 3 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
IJNSEC
2006
107views more  IJNSEC 2006»
14 years 11 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu