Sciweavers

19 search results - page 2 / 4
» acisp 2010
Sort
View
ACISP
2010
Springer
13 years 8 months ago
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...
ACISP
2010
Springer
13 years 8 months ago
On Multidimensional Linear Cryptanalysis
Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
ACISP
2010
Springer
13 years 8 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
ACISP
2010
Springer
13 years 8 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...