Sciweavers

261 search results - page 37 / 53
» On the Security of Some Password-Based Key Agreement Schemes
Sort
View
CISC
2009
Springer
171views Cryptology» more  CISC 2009»
13 years 8 months ago
Sanitizable Signatures with Strong Transparency in the Standard Model
Sanitizable signatures provide several security features which are useful in many scenarios including military and medical applications. Sanitizable signatures allow a semi-trusted...
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. P...
IACR
2011
80views more  IACR 2011»
12 years 10 months ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
CSI
2010
232views more  CSI 2010»
13 years 9 months ago
Advanced smart card based password authentication protocol
Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme...
Ronggong Song
CRYPTO
2006
Springer
107views Cryptology» more  CRYPTO 2006»
14 years 2 months ago
Cryptanalysis of 2R- Schemes
Abstract. In this paper, we study the security of 2Rschemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n p...
Jean-Charles Faugère, Ludovic Perret
ECRA
2007
73views more  ECRA 2007»
13 years 11 months ago
An innovative revocation scheme for one-to-many E-services
E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
Ren-Hung Lin, Jinn-ke Jan