Sciweavers

ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
14 years 5 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 5 months ago
Merkle Signatures with Virtually Unlimited Signature Capacity
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a cryptographically unlimited (280 ) number of documents ...
Johannes Buchmann, Erik Dahmen, Elena Klintsevich,...
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 5 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
14 years 5 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
ACNS
2007
Springer
110views Cryptology» more  ACNS 2007»
14 years 5 months ago
Compressed XTR
Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho ...