Sciweavers

51 search results - page 4 / 11
» icisc 2007
Sort
View
ICISC
2001
89views Cryptology» more  ICISC 2001»
14 years 11 months ago
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
In 1999, Bao et al. proposed [5] a multi-party fair exchange protocol of electronic items with an offline trusted third party. In this protocol, a coalition including the initiator...
Nicolás González-Deleito, Olivier Ma...
ICISC
2001
98views Cryptology» more  ICISC 2001»
14 years 11 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
ICISC
2001
132views Cryptology» more  ICISC 2001»
14 years 11 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
ICISC
2001
156views Cryptology» more  ICISC 2001»
14 years 11 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
ICISC
2003
117views Cryptology» more  ICISC 2003»
14 years 11 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz