Sciweavers

IJISEC
2010
159views more  IJISEC 2010»
13 years 8 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
CCS
2010
ACM
13 years 9 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
EUROPKI
2009
Springer
13 years 9 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
INDOCRYPT
2010
Springer
13 years 9 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
FOCS
2010
IEEE
13 years 9 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
WINET
2010
179views more  WINET 2010»
13 years 10 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
JCS
2010
104views more  JCS 2010»
13 years 10 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
IDTRUST
2010
ACM
13 years 10 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
COMCOM
1999
107views more  COMCOM 1999»
13 years 11 months ago
A formalisation and evaluation of certificate policies
Certificate policies play a central role in public key infrastructures, since they are the basis for the evaluation of trust in binding between a key and a subject in a public key...
Tomaz Klobucar, Borka Jerman-Blazic
DCC
2000
IEEE
13 years 11 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko