Sciweavers

78 search results - page 7 / 16
» (Convertible) Undeniable Signatures Without Random Oracles
Sort
View
EUROCRYPT
1999
Springer
13 years 12 months ago
Secure Hash-and-Sign Signatures Without the Random Oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
JISE
2008
89views more  JISE 2008»
13 years 7 months ago
Identity-Based Parallel Key-Insulated Signature Without Random Oracles
Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu
ISW
2007
Springer
14 years 1 months ago
Identity-Based Proxy Re-encryption Without Random Oracles
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert ...
Cheng-Kang Chu, Wen-Guey Tzeng
ASIACRYPT
2010
Springer
13 years 5 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 1 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...