Sciweavers

555 search results - page 39 / 111
» From ABZ to Cryptography
Sort
View
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
14 years 4 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
TCC
2007
Springer
92views Cryptology» more  TCC 2007»
14 years 4 months ago
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
We present a lower bound on the round complexity of a natural class of black-box constructions of statistically hiding commitments from one-way permutations. This implies a Ω( n ...
Hoeteck Wee
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 3 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
14 years 3 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 3 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang