Sciweavers

1161 search results - page 189 / 233
» Group Message Authentication
Sort
View
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 8 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
FIRSTMONDAY
2000
75views more  FIRSTMONDAY 2000»
13 years 8 months ago
Free Riding on Gnutella
An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we e...
Eytan Adar, Bernardo A. Huberman
JSAC
2010
120views more  JSAC 2010»
13 years 7 months ago
A simple and scalable algorithm for alignment in broadcast networks
We consider the problem of coordinating a group of mobile nodes communicating through a wireless medium. The objective of the network is the alignment of all the nodes towards a c...
Roberto Pagliari, Mehmet E. Yildiz, Shrut Kirti, K...
JOC
2011
102views more  JOC 2011»
13 years 4 months ago
Wildcarded Identity-Based Encryption
In this paper we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers ...
Michel Abdalla, James Birkett, Dario Catalano, Ale...
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 4 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay