Sciweavers

53 search results - page 8 / 11
» Bilinear Groups of Composite Order
Sort
View
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
ASM
2010
ASM
14 years 2 months ago
A Basis for Feature-Oriented Modelling in Event-B
Abstract. Feature-oriented modelling is a well-known approach for Software Product Line (SPL) development. It is a widely used method when developing groups of related software. Wi...
Jennifer Sorge, Michael Poppleton, Michael Butler
CORR
2008
Springer
94views Education» more  CORR 2008»
13 years 7 months ago
On the Structure of the Capacity Region of Asynchronous Memoryless Multiple-Access Channels
The asynchronous capacity region of memoryless multiple-access channels is the union of certain polytopes. It is well-known that vertices of such polytopes may be approached via a...
Ninoslav Marina, Bixio Rimoldi
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 5 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano