Sciweavers

346 search results - page 40 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 1 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ESORICS
2010
Springer
15 years 2 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 8 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 8 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh