Sciweavers

261 search results - page 36 / 53
» On the Security of Some Password-Based Key Agreement Schemes
Sort
View
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 10 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 4 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
ICWE
2005
Springer
14 years 4 months ago
Secure Web Forms with Client-Side Signatures
Abstract. The World Wide Web is evolving from a platform for information access into a platform for interactive services. The interaction of the services is provided by forms. Some...
Mikko Honkala, Petri Vuorimaa
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ICISC
2004
147views Cryptology» more  ICISC 2004»
14 years 9 days ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim