Sciweavers

19 search results - page 2 / 4
» acisp 2010
Sort
View
ACISP
2010
Springer
13 years 10 months ago
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...
ACISP
2010
Springer
13 years 10 months ago
On Multidimensional Linear Cryptanalysis
Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
ACISP
2010
Springer
13 years 10 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
ACISP
2010
Springer
13 years 10 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...