Sciweavers

ACNS
2004
Springer
90views Cryptology» more  ACNS 2004»
14 years 10 days ago
Centralized Management of Virtual Security Zones in IP Networks
Antti Peltonen, Teemupekka Virtanen, Esa Turtiaine...
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
14 years 10 days ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
14 years 10 days ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
14 years 10 days ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
14 years 10 days ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...
FC
2009
Springer
67views Cryptology» more  FC 2009»
14 years 14 days ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
FC
2009
Springer
84views Cryptology» more  FC 2009»
14 years 14 days ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
EUROCRYPT
2009
Springer
14 years 14 days ago
Optimal Randomness Extraction from a Diffie-Hellman Element
Céline Chevalier, Pierre-Alain Fouque, Davi...
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 14 days ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap