Sciweavers

136 search results - page 25 / 28
» Security Proofs for Identity-Based Identification and Signat...
Sort
View
CCS
2008
ACM
14 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
PET
2010
Springer
15 years 1 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 2 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
EUROCRYPT
1998
Springer
15 years 2 months ago
Divertible Protocols and Atomic Proxy Cryptography
Abstract. First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a defi...
Matt Blaze, Gerrit Bleumer, Martin Strauss
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...