Sciweavers

CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
CTRSA
2009
Springer
157views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Strengthening Security of RSA-OAEP
Alexandra Boldyreva
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 6 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue
CTRSA
2009
Springer
125views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosity assumption. Our scheme is a variant of Cocks IBE...
Giuseppe Ateniese, Paolo Gasti
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 6 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger