• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 73
Next 10 →

New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications

by Dario Catalano, Rosario Gennaro , 1999
"... Verifiable Signature Sharing (V\SigmaS ) was introduced by Franklin and Reiter in [20]. V\SigmaS enables the recipient of a digital signature, who is not necessarily the original signer, to share that signature among n proxies so that a subset of them can later reconstruct it. In [20] efficient p ..."
Abstract - Cited by 15 (1 self) - Add to MetaCart
protocols were given for RSA, Rabin, ElGamal, Schnorr and DSS signatures. However their RSA and Rabin V\SigmaS protocols were subsequently broken and their DSS V\SigmaS lacks a formal proof of security. We present new protocols for RSA, Rabin and DSS V\SigmaS . Our protocols are efficient and provably

Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes

by Jan Camenisch , 2000
"... Abstract. We generalize and improve the security and efficiency ofthe verifiable encryption scheme ofAsokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group enc ..."
Abstract - Cited by 63 (10 self) - Add to MetaCart
Abstract. We generalize and improve the security and efficiency ofthe verifiable encryption scheme ofAsokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group

Verifiable Encryption, Group Encryption, and their Applications to Separable Group Signatures and Signature Sharing Schemes

by unknown authors
"... Abstract We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group en ..."
Abstract - Add to MetaCart
Abstract We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group

Verifiable Encryption, Group Encryption, and their Applications to Separable Group Signatures and Signature Sharing Schemes

by unknown authors
"... We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group encryption. ..."
Abstract - Add to MetaCart
We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group encryption

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance

by Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang - Proc. IEEE INFOCOM, Apr. 2009. 684 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL , 2011
"... Abstract—Recently, distributed data storage has gained in-creasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the on ..."
Abstract - Cited by 40 (9 self) - Add to MetaCart
scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs. I.

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt

by Alexander Klink, Betreut Von Evangelos Karatsiolis, Technische Universität Darmstadt, Fachbereich Informatik, Fachgebiet Theoretische Informatik
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract - Add to MetaCart
I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant

doi:10.1155/2012/923594 Research Article Analysis of Mobility and Sharing of WSNs By IP Applications

by Dennis J. A. Bijwaard, Paul J. M. Havinga, Henk Eertink
"... License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple ..."
Abstract - Add to MetaCart
in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe which mobility support can best be used in different scenarios, and how shared usage of mobile WSANs by multiple IP applications can best be scaled up. This paper

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

by Johann Van Der Merwe, Dawoud S. Dawoud, Stephen Mcdonald
"... Abstract—Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatu ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a secure and efficient threshold-multisignature scheme. The paper uniquely defines
Next 10 →
Results 1 - 10 of 73
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University