Sciweavers

1190 search results - page 196 / 238
» Secure off-the-record messaging
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 9 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ISPDC
2010
IEEE
13 years 9 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 9 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 9 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 5 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang