Sciweavers

IJISEC
2010
159views more  IJISEC 2010»
13 years 9 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
IJISEC
2010
114views more  IJISEC 2010»
13 years 9 months ago
A new hardware-assisted PIR with O(n) shuffle cost
Abstract Since the concept of private information retrieval (PIR) was first formalized by Chor et. al, various constructions have been proposed with a common goal of reducing commu...
Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong...
IJISEC
2010
150views more  IJISEC 2010»
13 years 9 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
IJISEC
2010
87views more  IJISEC 2010»
13 years 11 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
IJISEC
2010
85views more  IJISEC 2010»
13 years 11 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
IJISEC
2010
73views more  IJISEC 2010»
13 years 11 months ago
A new probabilistic rekeying method for secure multicast groups
Alwyn Roshan Pais, Shankar Joshi
IJISEC
2010
121views more  IJISEC 2010»
13 years 11 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes