Sciweavers

ACISP
2003
Springer
14 years 3 months ago
Digital Signature Schemes with Restriction on Signing Capability
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member may be allowed to generate signatures up to a certain numb...
Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jo...
ACISP
2003
Springer
14 years 3 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
ACISP
2003
Springer
14 years 3 months ago
Grouping Verifiable Content for Selective Disclosure
Abstract. This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more ...
Laurence Bull, David McG. Squire, Jan Newmarch, Yu...
ACISP
2003
Springer
14 years 4 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ACISP
2003
Springer
14 years 4 months ago
An Anonymous Credential System and a Privacy-Aware PKI
Abstract. In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special ce...
Pino Persiano, Ivan Visconti
ACISP
2003
Springer
14 years 4 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell
ACISP
2003
Springer
14 years 4 months ago
The Unsolvable Privacy Problem and Its Implications for Security Technologies
Abstract. Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended argues that there are strong incentive...
Andrew M. Odlyzko
ACISP
2003
Springer
14 years 4 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
ACISP
2003
Springer
14 years 4 months ago
New Constructions for Resilient and Highly Nonlinear Boolean Functions
Abstract. We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables wit...
Khoongming Khoo, Guang Gong
ACISP
2003
Springer
14 years 4 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa