Sciweavers

ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 2 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
ACNS
2005
Springer
81views Cryptology» more  ACNS 2005»
14 years 2 months ago
Searching for High-Value Rare Events with Uncheatable Grid Computing
Abstract. High-value rare-event searching is arguably the most natural application of grid computing, where computational tasks are distributed to a large collection of clients (wh...
Wenliang Du, Michael T. Goodrich
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 2 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
ACNS
2005
Springer
85views Cryptology» more  ACNS 2005»
14 years 2 months ago
New Signature Schemes with Coupons and Tight Reduction
Amongst provably secure signature schemes, two distinct classes are of particular interest: the ones with tight reduction (e.g., RSA-PSS), and those which support the use of coupon...
Benoît Chevallier-Mames
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 2 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
14 years 2 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 2 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
14 years 2 months ago
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management
Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaj...
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 2 months ago
Badger - A Fast and Provably Secure MAC
We present Badger, a new fast and provably secure MAC based on universal hashing. In the construction, a modified tree hash that is more efficient than standard tree hashing is us...
Martin Boesgaard, Thomas Christensen, Erik Zenner