Sciweavers

CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 9 days ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
15 years 9 days ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
CISC
2008
Springer
94views Cryptology» more  CISC 2008»
15 years 9 days ago
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook, Moti Yung, Angelos D. Keromytis
91
Voted
CISC
2008
Springer
100views Cryptology» more  CISC 2008»
15 years 9 days ago
Security Analysis of Multivariate Polynomials for Hashing
Luk Bettale, Jean-Charles Faugère, Ludovic ...
83
Voted
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 9 days ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 9 days ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo