Sciweavers

2735 search results - page 97 / 547
» Comparing notions of randomness
Sort
View
FC
2006
Springer
147views Cryptology» more  FC 2006»
14 years 18 days ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
AAAI
2010
13 years 10 months ago
Truth, Justice, and Cake Cutting
Cake cutting is a common metaphor for the division of a heterogeneous divisible good. There are numerous papers that study the problem of fairly dividing a cake; a small number of...
Yiling Chen, John Lai, David C. Parkes, Ariel D. P...
NIPS
2008
13 years 10 months ago
Bayesian Model of Behaviour in Economic Games
Classical game theoretic approaches that make strong rationality assumptions have difficulty modeling human behaviour in economic games. We investigate the role of finite levels o...
Debajyoti Ray, Brooks King-Casas, P. Read Montague...
ISCI
2008
160views more  ISCI 2008»
13 years 9 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
13 years 6 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome