Sciweavers

915 search results - page 102 / 183
» Proof labeling schemes
Sort
View
ESOP
2005
Springer
14 years 1 months ago
A Type System Equivalent to a Model Checker
ite-state abstraction scheme such as predicate abstraction. The type system, which is also parametric, type checks exactly those programs that are accepted by the model checker. It...
Mayur Naik, Jens Palsberg
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 1 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
TRUSTBUS
2004
Springer
14 years 1 months ago
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
This paper addresses the problem of pay-as-you-watch services over unicast and multicast communications. For each communication model, we present two solutions, non-verifiable and...
Antoni Martínez-Ballesté, Francesc S...
ASIACRYPT
2000
Springer
14 years 13 days ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
EUROCRYPT
1998
Springer
14 years 9 days ago
A Formal Treatment of Remotely Keyed Encryption
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secre...
Matt Blaze, Joan Feigenbaum, Moni Naor