Sciweavers

525 search results - page 7 / 105
» Threshold Schemes with Disenrollment
Sort
View
PROVSEC
2007
Springer
14 years 3 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
ASIACRYPT
2000
Springer
14 years 1 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
COCO
2005
Springer
92views Algorithms» more  COCO 2005»
14 years 2 months ago
Monotone Circuits for Weighted Threshold Functions
Weighted threshold functions with positive weights are a natural generalization of unweighted threshold functions. These functions are clearly monotone. However, the naive way of ...
Amos Beimel, Enav Weinreb
ASIACRYPT
2001
Springer
14 years 1 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
JSAC
1998
136views more  JSAC 1998»
13 years 8 months ago
Concatenated Decoding with a Reduced-Search BCJR Algorithm
—We apply two reduced-computation variants of the BCJR algorithm to the decoding of serial and parallel concatenated convolutional codes. One computes its recursions at only M st...
Volker Franz, John B. Anderson