Sciweavers

EUROCRYPT
1998
Springer
14 years 3 months ago
Fast Batch Verification for Modular Exponentiation and Digital Signatures
Mihir Bellare, Juan A. Garay, Tal Rabin
EUROCRYPT
1998
Springer
14 years 3 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram
CRYPTO
1998
Springer
137views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
Building PRFs from PRPs
Abstract. We evaluate constructions for building pseudo-random functions (PRFs) from pseudo-random permutations (PRPs). We present two constructions: a slower construction which pr...
Chris Hall, David Wagner, John Kelsey, Bruce Schne...
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
CRYPTO
1998
Springer
119views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractabili...
Ronald Cramer, Victor Shoup
CRYPTO
1998
Springer
83views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
Time-Stamping with Binary Linking Schemes
We state the basic requirements for time-stamping systems applicable as the necessary support to the legal use of electronic documents. We analyze the main drawbacks of the time-st...
Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Wille...
CRYPTO
1998
Springer
106views Cryptology» more  CRYPTO 1998»
14 years 3 months ago
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Verifiable Signature Sharing (VS ) enables the recipient of a digital signature, who is not necessarily the original signer, to share such signature among n proxies so that a subse...
Dario Catalano, Rosario Gennaro