Sciweavers

171 search results - page 16 / 35
» Braid Group Cryptography
Sort
View
ICMCS
2000
IEEE
83views Multimedia» more  ICMCS 2000»
14 years 2 months ago
System Aspects of Copy Management for Digital Video
- THIS PAPER REVIEWS BASIC PRINCIPLES OF COPY PROTECTION FOR DIGITAL VIDEO. WE DISTINGUISH BETWEEN THE ROLE OF CRYPTOGRAPHY AND EMBEDDED SIGNALING, AS SEEN BY STANDARDIZATION BODIE...
Jean-Paul M. G. Linnartz, Joop Talstra, Ton Kalker...
IPL
2006
118views more  IPL 2006»
13 years 9 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 11 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
JOC
2006
116views more  JOC 2006»
13 years 9 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
14 years 1 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith