Sciweavers

34 search results - page 4 / 7
» asiacrypt 2003
Sort
View
ASIACRYPT
2003
Springer
15 years 2 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
ASIACRYPT
2003
Springer
15 years 1 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
ASIACRYPT
2003
Springer
15 years 2 months ago
On Class Group Computations Using the Number Field Sieve
The best practical algorithm for class group computations in imaginary quadratic number fields (such as group structure, class number, discrete logarithm computations) is a varian...
Mark L. Bauer, Safuat Hamdy
91
Voted
ASIACRYPT
2003
Springer
15 years 1 months ago
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
ASIACRYPT
2003
Springer
15 years 2 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai