: To plan and improve a fuzzy logic and neural network based trust and reputation model for safe resource allocation in cloud computing is the most important motto of this research...
Outsourcing secure multiparty computation (SMC) protocols has allowed resource-constrained devices to take advantage of these developing cryptographic primitives with great effici...
Abstract. Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft’s Active Directory and shipped with ...
The task of finding a constructive approximation in the computational distance, while simultaneously preserving additional constrains (referred to as "simulators"), app...
The simple matrix encryption scheme (Tao-Diene-Tang-Ding, PQCrypto 2013) has a problem of decryption failures. Quite recently, Petzoldt-Ding-Wang (http://eprint.iacr. org/2016/010...
Abstract. Password-protected secret sharing (PPSS) schemes allow a user to publicly share this highentropy secret across different servers and to later recover it by interacting w...
Michel Abdalla, Mario Cornejo, Anca Nitulescu, Dav...
Abstract. We introduce a new cryptographic primitive: Proofs of SpaceTime (PoSTs) and construct a practical protocol for implementing these proofs. A PoST allows a prover to convin...
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users ...
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or w...
Recently, the security of RSA variants with moduli N = pr q, e.g., the Takagi RSA and the prime power RSA, have been actively studied in several papers. Due to the unusual composit...