Sciweavers

1769 search results - page 247 / 354
» Cryptography
Sort
View
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
14 years 4 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
14 years 4 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 4 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
SSC
2007
Springer
192views Cryptology» more  SSC 2007»
14 years 4 months ago
On Boolean Functions Which Are Bent and Negabent
Bent functions f : Fm 2 → F2 achieve largest distance to all linear functions. Equivalently, their spectrum with respect to the Hadamard-Walsh transform is flat (i.e. all spectr...
Matthew G. Parker, Alexander Pott
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 4 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr