Sciweavers

1064 search results - page 118 / 213
» Cryptography from Anonymity
Sort
View
ICMCS
2007
IEEE
211views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Context-Based Scalable Coding and Representation of High Resolution Art Pictures for Remote Data Access
EROS is the largest database in the world of high resolution art pictures. The TSAR project is designed to open it in a secure, efficient and user-friendly way that involves cryp...
Marie Babel, Olivier Déforges, Laurent B&ea...
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 10 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
TCC
2007
Springer
92views Cryptology» more  TCC 2007»
15 years 10 months ago
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
We present a lower bound on the round complexity of a natural class of black-box constructions of statistically hiding commitments from one-way permutations. This implies a Ω( n ...
Hoeteck Wee
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 9 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 9 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...