Sciweavers

608 search results - page 65 / 122
» Interactive Oracle Proofs
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
IADIS
2004
13 years 11 months ago
OLAP in enterprise decision modelling
This paper describes the application of online analytical processing (OLAP) in the field of data mining. We discuss knowledge discovery in enterprise databases as well as data war...
Perihan Kilimci, Bora Gökçe, Oya Kalip...
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
TARK
2009
Springer
14 years 4 months ago
An epistemic characterization of zero knowledge
Halpern, Moses and Tuttle presented a definition of interactive proofs using a notion they called practical knowledge, but left open the question of finding an epistemic formula...
Joseph Y. Halpern, Rafael Pass, Vasumathi Raman