Sciweavers

598 search results - page 67 / 120
» On the Security of ElGamal Based Encryption
Sort
View
SDMW
2005
Springer
14 years 1 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
JCST
2008
128views more  JCST 2008»
13 years 7 months ago
t-Private and t-Secure Auctions
In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one is interested in hiding th...
Markus Hinkelmann, Andreas Jakoby, Peer Stechert
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
13 years 11 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
AINA
2004
IEEE
13 years 11 months ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
ASIACRYPT
2009
Springer
14 years 2 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan