Sciweavers

743 search results - page 55 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
ACISP
2010
Springer
13 years 10 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
14 years 2 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to aâ€...
Jörn Müller-Quade, Dominique Unruh
JCP
2007
122views more  JCP 2007»
13 years 8 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
ICMCS
1999
IEEE
150views Multimedia» more  ICMCS 1999»
14 years 1 months ago
DIVeR: A Dynamic Interactive Video Retrieval Protocol for Disk Array Based Servers
Video-on-demand (VOD) is a very promising multimedia application of the near future. In order for such a service to be commercially viable, efficient storage and retrieval schemes...
Senthil Sengodan, Victor O. K. Li
ISW
2004
Springer
14 years 2 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner