Sciweavers

121 search results - page 18 / 25
» A Ring Signature Scheme Using Bilinear Pairings
Sort
View
EUROCRYPT
2004
Springer
14 years 7 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 8 months ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
ASIACRYPT
2003
Springer
14 years 5 days ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
IJSNET
2006
78views more  IJSNET 2006»
13 years 8 months ago
RICA: a ring-based information collection architecture in wireless sensor networks
: We propose a novel data collection architecture, called Ring-based Information Collection Architecture (RICA), for sensor networks. In the RICA scheme, sensors are organised into...
Shih-Chang Huang, Rong-Hong Jan, Wuu Yang
NDSS
2000
IEEE
14 years 27 days ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin