Sciweavers

787 search results - page 117 / 158
» Subversion-Resilient Signature Schemes
Sort
View
ASIACRYPT
2010
Springer
14 years 7 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
JSAC
2011
142views more  JSAC 2011»
14 years 4 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
ICDE
2000
IEEE
144views Database» more  ICDE 2000»
15 years 11 months ago
Power Conservative Multi-Attribute Queries on Data Broadcast
In this paper, we study power conservation techniques for multi-attribute queries on wireless data broadcast channels. Indexing data on broadcast channels can improve client filte...
Qinglong Hu, Wang-Chien Lee, Dik Lun Lee
GLOBECOM
2006
IEEE
15 years 3 months ago
Bank Transfer over Quantum Channel with Digital Checks
- In recent years, many quantum cryptographic schemes have been proposed. However, it seems that there are many technical difficulties to realize them (except Quantum Key Distribut...
Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Shel...
CCS
2008
ACM
14 years 11 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim