Sciweavers

PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 5 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
14 years 5 months ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
14 years 5 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
14 years 5 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
14 years 5 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
PKC
2004
Springer
90views Cryptology» more  PKC 2004»
14 years 5 months ago
New Security Results on Encrypted Key Exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 5 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
PKC
2004
Springer
135views Cryptology» more  PKC 2004»
14 years 5 months ago
A Generalized Wiener Attack on RSA
Johannes Blömer, Alexander May
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 5 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng