Sciweavers

CRYPTO
2004
Springer
205views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model
In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, intro...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
CRYPTO
2004
Springer
77views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks
Ivan Damgård, Serge Fehr, Louis Salvail
Cryptology
Top of PageReset Settings