Sciweavers

530 search results - page 49 / 106
» Practical Threshold Signatures
Sort
View
PODC
2003
ACM
14 years 1 months ago
An asynchronous protocol for distributed computation of RSA inverses and its applications
This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of pa...
Christian Cachin
CN
2007
124views more  CN 2007»
13 years 8 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 8 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
14 years 2 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
ADHOCNOW
2006
Springer
14 years 1 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou