When will we be secure? Nobody knows for sure ā but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersā...
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Abstract. In this work we will show how non-qualiļ¬ed electronic signatures and time stamps can be eļ¬ciently enhanced in order to equip them with similar features as qualiļ¬ed ...
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...