Sciweavers

4111 search results - page 194 / 823
» Security, Protocols, and Trust
Sort
View
IJSN
2007
94views more  IJSN 2007»
13 years 10 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
14 years 3 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding
ECWEB
2000
Springer
121views ECommerce» more  ECWEB 2000»
14 years 3 months ago
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
In this paper we propose an e-commerce protocol with the following features: (1) ensures true fair exchange, (2) does not require manual dispute resolution in case of unfair behavi...
Indrakshi Ray, Indrajit Ray
EUROCRYPT
2001
Springer
14 years 3 months ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
CN
2006
81views more  CN 2006»
13 years 10 months ago
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy...
Sergio Marti, Hector Garcia-Molina