Sciweavers

948 search results - page 79 / 190
» Attacking cryptographic schemes based on
Sort
View
EUROCRYPT
1999
Springer
14 years 10 days ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 2 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
COMPSAC
2004
IEEE
13 years 11 months ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
13 years 8 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
JNW
2006
149views more  JNW 2006»
13 years 8 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo