We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
tographic Abstract Machine Dean Rosenzweig and Davor Runje University of Zagreb The Cryptographic Abstract Machine is an executional model of cryptographic actions, independent of ...
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...