Sciweavers

15 search results - page 1 / 3
» isw 2007
Sort
View
ISW
2007
Springer
15 years 10 months ago
Traitor Tracing with Optimal Transmission Rate
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
ISW
2010
Springer
15 years 1 months ago
Security Reductions of the Second Round SHA-3 Candidates
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities identified in e...
Elena Andreeva, Bart Mennink, Bart Preneel
ISW
2007
Springer
15 years 10 months ago
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Abstract. The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way t...
Alexander W. Dent, Qiang Tang
ISW
2007
Springer
15 years 10 months ago
Identity-Based Proxy Re-encryption Without Random Oracles
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert ...
Cheng-Kang Chu, Wen-Guey Tzeng