Sciweavers

346 search results - page 47 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
105
Voted
AMC
2005
188views more  AMC 2005»
15 years 1 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
15 years 5 days ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 11 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
129
Voted
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 6 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor