Sciweavers

102 search results - page 4 / 21
» A Formal Model of Identity Mixer
Sort
View
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 3 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
CJ
2006
100views more  CJ 2006»
13 years 9 months ago
Deterministic Identity-Based Signatures for Partial Aggregation
Aggregate signatures are a useful primitive which allows to aggregate into a single and constant-length signature many signatures on different messages computed by different users...
Javier Herranz
ECOOP
2007
Springer
14 years 4 months ago
Declarative Object Identity Using Relation Types
Object-oriented languages define the identity of an object to be an address-based object identifier. The programmer may customize the notion of object identity by overriding the ...
Mandana Vaziri, Frank Tip, Stephen Fink, Julian Do...
COCO
2005
Springer
128views Algorithms» more  COCO 2005»
14 years 3 months ago
More on Noncommutative Polynomial Identity Testing
We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient algorithms for the following problems in the noncommutative...
Andrej Bogdanov, Hoeteck Wee
PROVSEC
2009
Springer
14 years 4 months ago
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...