Sciweavers

177 search results - page 22 / 36
» On the Security of Identity Based Ring Signcryption Schemes
Sort
View
EUROCRYPT
2010
Springer
14 years 9 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 9 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
JCM
2007
143views more  JCM 2007»
13 years 7 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
14 years 1 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
IH
2005
Springer
14 years 1 months ago
A Family of Collusion 2-Secure Codes
Abstract. We present systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting...
Josep Cotrina Navau, Marcel Fernandez, Miguel Sori...