Sciweavers

82
Voted
ICISC
2001
162views Cryptology» more  ICISC 2001»
14 years 10 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ICISC
2001
156views Cryptology» more  ICISC 2001»
14 years 10 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
77
Voted
ICISC
2001
132views Cryptology» more  ICISC 2001»
14 years 10 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
ICISC
2001
98views Cryptology» more  ICISC 2001»
14 years 10 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
ICISC
2001
89views Cryptology» more  ICISC 2001»
14 years 10 months ago
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
In 1999, Bao et al. proposed [5] a multi-party fair exchange protocol of electronic items with an offline trusted third party. In this protocol, a coalition including the initiator...
Nicolás González-Deleito, Olivier Ma...