Sciweavers

199 search results - page 25 / 40
» Adaptive Proofs of Knowledge in the Random Oracle Model
Sort
View
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
15 years 8 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
115
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 10 months ago
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
Huafei Zhu, Feng Bao
139
Voted
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 9 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
15 years 3 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
118
Voted
FOCS
2007
IEEE
15 years 10 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...