Sciweavers

1190 search results - page 37 / 238
» Secure off-the-record messaging
Sort
View
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 6 months ago
Security of Blind Signatures Revisited
We revisit the definition of unforgeability of blind signatures as proposed by Pointcheval and Stern (Journal of Cryptology 2000). Surprisingly, we show that this established deļ¬...
Dominique Schröder, Dominique Unruh
CRYPTO
2005
Springer
94views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Improved Security Analyses for CBC MACs
We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bit...
Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
AMC
2005
126views more  AMC 2005»
15 years 4 months ago
Security of a multisignature scheme for specified group of verifiers
A multisignature scheme for specified group of verifiers needs a group of signers' cooperation to sign a message to a specified group of verifiers that must cooperate to check...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
15 years 6 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
ESORICS
2009
Springer
16 years 5 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...