Sciweavers

6555 search results - page 82 / 1311
» Secure attribute-based systems
Sort
View
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
14 years 17 days ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
EUROCRYPT
2008
Springer
13 years 10 months ago
Proving Tight Security for Rabin-Williams Signatures
This paper proves "tight security in the random-oracle model relative to factorization" for the lowest-cost signature systems available today: every hash-generic signatur...
Daniel J. Bernstein
USENIX
2003
13 years 10 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
ICIP
1998
IEEE
14 years 10 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
14 years 2 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner