Sciweavers

357 search results - page 26 / 72
» Distributed Attribute-Based Encryption
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 2 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 9 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
AINA
2007
IEEE
14 years 3 months ago
A Decentralized Authorization Architecture
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
PACT
2005
Springer
14 years 2 months ago
Information Flow Analysis for VHDL
We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow a...
Terkel K. Tolstrup, Flemming Nielson, Hanne Riis N...
MMMACNS
2001
Springer
14 years 1 months ago
On Some Cryptographic Properties of Rijndael
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES)....
Selçuk Kavut, Melek D. Yücel