Sciweavers

1302 search results - page 24 / 261
» Soundness in the Public-Key Model
Sort
View
PERCOM
2011
ACM
14 years 5 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 8 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ISMIR
2003
Springer
92views Music» more  ISMIR 2003»
15 years 7 months ago
Using morphological description for generic sound retrieval
Systems for sound retrieval are usually “sourcecentred”. This means that retrieval is based on using the proper keywords that define or specify a sound source. Although this t...
Julien Ricard, Perfecto Herrera
CCS
2009
ACM
16 years 2 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
15 years 8 months ago
Securely Obfuscating Re-encryption
Abstract. We present the first positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...