Sciweavers

1166 search results - page 28 / 234
» Adaptively Secure Broadcast
Sort
View
TCC
2004
Springer
131views Cryptology» more  TCC 2004»
14 years 4 months ago
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems
Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure encryption. Essentially a cryptosystem that is RCCA secure ...
Jens Groth
IEICET
2007
76views more  IEICET 2007»
13 years 11 months ago
Performance Analysis of IEEE 802.11 DCF in a Multi-Rate WLAN
The IEEE 802.11 family of specifications is by far the most prominent and successful technique for accessing WLANs. Because the channel used by wireless devices is a time-varying...
Weikuo Chu, Yu-Chee Tseng
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 4 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both...
Dan Boneh, Craig Gentry, Brent Waters
TIT
2010
88views Education» more  TIT 2010»
13 years 5 months ago
Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages
This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message ...
Hung D. Ly, Tie Liu, Yingbin Liang