Sciweavers

490 search results - page 67 / 98
» A New Public-Key Cryptosystem
Sort
View
132
Voted
ANTS
2006
Springer
125views Algorithms» more  ANTS 2006»
15 years 7 months ago
Arithmetic of Generalized Jacobians
This paper aims at introducing generalized Jacobians as a new candidate for discrete logarithm (DL) based cryptography. The motivation for this work came from the observation that ...
Isabelle Déchène
DCC
2003
IEEE
16 years 3 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
PROVSEC
2007
Springer
15 years 10 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
DRM
2004
Springer
15 years 9 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
AGENTS
2001
Springer
15 years 8 months ago
Some thoughts on agent trust and delegation
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
Yuh-Jong Hu