Sciweavers

1251 search results - page 69 / 251
» On the security of group communication schemes
Sort
View
AMC
2005
218views more  AMC 2005»
13 years 8 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
ICC
2008
IEEE
122views Communications» more  ICC 2008»
14 years 2 months ago
Multi-Carrier Transmission with Limited Feedback: Power Loading over Sub-Channel Groups
— Feedback of channel state information (CSI) enables a multi-carrier transmitter to optimize the power allocation across sub-channels. We consider a single user feedback scheme ...
Manish Agarwal, Dongning Guo, Michael L. Honig
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
NGC
2001
Springer
113views Communications» more  NGC 2001»
14 years 17 days ago
Extremum Feedback for Very Large Multicast Groups
In multicast communication, it is often required that feedback is received from a potentially very large group of responders while at the same time a feedback implosion needs to be...
Jörg Widmer, Thomas Fuhrmann
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi