Sciweavers

743 search results - page 60 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
CSCWD
2008
Springer
13 years 10 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
TCC
2009
Springer
116views Cryptology» more  TCC 2009»
14 years 9 months ago
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Abstract. In this paper we consider commitment schemes that are secure against concurrent man-in-the-middle (cMiM) attacks. Under such attacks, two possible notions of security for...
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
CIS
2007
Springer
14 years 3 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 3 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry