Sciweavers

144 search results - page 25 / 29
» Fusion Discrete Logarithm Problems
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
CAAN
2004
Springer
14 years 2 months ago
Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives
We study the bandwidth allocation problem Maximize U(x), subject to Ax ≤ c; x ≥ 0 where U is a utility function, x is a bandwidth allocation vector, and Ax ≤ c represent the...
Sung-woo Cho, Ashish Goel
EUROCRYPT
2004
Springer
14 years 2 months ago
Concurrent Signatures
We introduce the concept of concurrent signatures. These allow two entities to produce two signatures in such a way that, from the point of view of any third party, both signatures...
Liqun Chen, Caroline Kudla, Kenneth G. Paterson
CTRSA
2001
Springer
129views Cryptology» more  CTRSA 2001»
14 years 1 months ago
Formal Security Proofs for a Signature Scheme with Partial Message Recovery
The Pintsov-Vanstone signature scheme with partial message recovery (PVSSR) is a variant of the Schnorr and Nyberg-Rueppel signature schemes. It produces very short signatures on ...
Daniel R. L. Brown, Donald Byron Johnson
ISCI
2008
104views more  ISCI 2008»
13 years 8 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen