Sciweavers

334 search results - page 31 / 67
» Public Key Encryption for the Forgetful
Sort
View
93
Voted
IEICET
2010
105views more  IEICET 2010»
15 years 2 months ago
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), a...
Goichiro Hanaoka, Kaoru Kurosawa
136
Voted
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 8 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
104
Voted
SCN
2008
Springer
15 years 3 months ago
Linear Bandwidth Naccache-Stern Encryption
Abstract. The Naccache-Stern (ns) knapsack cryptosystem is an original yet little-known public-key encryption scheme. In this scheme, the ciphertext is obtained by multiplying publ...
Benoît Chevallier-Mames, David Naccache, Jac...
140
Voted
SCN
2010
Springer
163views Communications» more  SCN 2010»
15 years 1 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia
168
Voted
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters