Sciweavers

25 search results - page 1 / 5
» Verifying Secrets and Relative Secrecy
Sort
View
POPL
2000
ACM
14 years 2 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
JCSS
2006
102views more  JCSS 2006»
13 years 10 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
ENTCS
2000
81views more  ENTCS 2000»
13 years 10 months ago
Secrecy, Group Creation
We lift Cardelli, Ghelli and Gordon's secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extens...
Luca Cardelli, Andy Gordon, Giorgio Ghelli
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
14 years 5 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ENTCS
2006
103views more  ENTCS 2006»
13 years 11 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström