Sciweavers

550 search results - page 68 / 110
» Public Key Encryption and Encryption Emulation Attacks
Sort
View
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 2 months ago
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia’2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains nondisclose...
Yongdong Wu, Feng Bao
EUROCRYPT
2004
Springer
14 years 2 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
USENIX
2007
13 years 11 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
JOC
2010
82views more  JOC 2010»
13 years 4 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
14 years 2 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar