Sciweavers

436 search results - page 49 / 88
» Using trust assumptions with security requirements
Sort
View
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
16 years 4 months ago
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because i...
Jürg Wullschleger
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
121
Voted
EUROPKI
2004
Springer
15 years 9 months ago
How to Qualify Electronic Signatures and Time Stamps
Abstract. In this work we will show how non-qualified electronic signatures and time stamps can be efficiently enhanced in order to equip them with similar features as qualified ...
Detlef Hühnlein
152
Voted
CCS
2008
ACM
15 years 6 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
110
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Distributed Blinding for Distributed ElGamal Re-Encryption
A protocol is given to take an ElGamal ciphertext encrypted under the key of one distributed service and produce the corresponding ciphertext encrypted under the key of another di...
Lidong Zhou, Michael A. Marsh, Fred B. Schneider, ...