Sciweavers

1562 search results - page 132 / 313
» Mathematics, Cryptology, Security
Sort
View
EUROCRYPT
1997
Springer
14 years 14 days ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
EUROCRYPT
1997
Springer
14 years 14 days ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
14 years 7 days ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
14 years 7 days ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
13 years 12 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina