Sciweavers

168 search results - page 25 / 34
» Group Encryption
Sort
View
FOCS
2010
IEEE
13 years 9 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
NGC
1999
Springer
106views Communications» more  NGC 1999»
14 years 3 months ago
Watercasting: Distributed Watermarking of Multicast Media
We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slig...
Ian Brown, Colin Perkins, Jon Crowcroft
IJNSEC
2007
83views more  IJNSEC 2007»
13 years 10 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
ISW
2004
Springer
14 years 4 months ago
Security Analysis of Two Signcryption Schemes
Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-th...
Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-J...
WWCA
1998
Springer
14 years 3 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai