Sciweavers

679 search results - page 32 / 136
» Using decision problems in public key cryptography
Sort
View
ISW
2004
Springer
15 years 6 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
15 years 6 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
OR
2006
Springer
15 years 1 months ago
An AHP model for construction contractor prequalification
Given that contractor plays a critical role in any construction project, contractor selection constitutes key decision for public authorities. Prequalification, i.e. the eliminati...
K. P. Anagnostopoulos, A. P. Vavatsikos
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 6 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 8 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...