Sciweavers

773 search results - page 7 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
14 years 3 months ago
On the Nature of Knowledge: Rethinking Popular Assumptions
Knowledge management (KM) has been an increasing focus for both researchers and practitioners for more than a decade. The discussions generally have viewed the goal of KM as the a...
Brian T. Keane, Robert M. Mason
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
FASE
2011
Springer
13 years 1 months ago
Automated Learning of Probabilistic Assumptions for Compositional Reasoning
Probabilistic verification techniques have been applied to the formal modelling and analysis of a wide range of systems, from communication protocols such as Bluetooth, to nanosca...
Lu Feng, Marta Z. Kwiatkowska, David Parker