Results 1 - 10
of
73
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
, 1999
"... Verifiable Signature Sharing (V\SigmaS ) was introduced by Franklin and Reiter in [20]. V\SigmaS enables the recipient of a digital signature, who is not necessarily the original signer, to share that signature among n proxies so that a subset of them can later reconstruct it. In [20] efficient p ..."
Abstract
-
Cited by 15 (1 self)
- Add to MetaCart
protocols were given for RSA, Rabin, ElGamal, Schnorr and DSS signatures. However their RSA and Rabin V\SigmaS protocols were subsequently broken and their DSS V\SigmaS lacks a formal proof of security. We present new protocols for RSA, Rabin and DSS V\SigmaS . Our protocols are efficient and provably
Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes
, 2000
"... Abstract. We generalize and improve the security and efficiency ofthe verifiable encryption scheme ofAsokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group enc ..."
Abstract
-
Cited by 63 (10 self)
- Add to MetaCart
Abstract. We generalize and improve the security and efficiency ofthe verifiable encryption scheme ofAsokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group
Verifiable Encryption, Group Encryption, and their Applications to Separable Group Signatures and Signature Sharing Schemes
"... Abstract We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group en ..."
Abstract
- Add to MetaCart
Abstract We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group
Verifiable Encryption, Group Encryption, and their Applications to Separable Group Signatures and Signature Sharing Schemes
"... We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group encryption. ..."
Abstract
- Add to MetaCart
We generalize and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without assuming random oracles. We extend our basic protocol to a new primitive called verifiable group encryption
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
- Proc. IEEE INFOCOM, Apr. 2009. 684 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL
, 2011
"... Abstract—Recently, distributed data storage has gained in-creasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed architecture also makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the on ..."
Abstract
-
Cited by 40 (9 self)
- Add to MetaCart
scheme enables individual sensors to verify in one protocol execution all the pertaining data shares simultaneously in the absence of the original data. Extensive security and performance analysis shows that the proposed schemes have strong resistance against various attacks and are practical for WSNs. I.
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law
Cryptographic Voting Protocols A Prototype Design and Implementation for University Elections at TU Darmstadt
"... I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant m ..."
Abstract
- Add to MetaCart
I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant
doi:10.1155/2012/923594 Research Article Analysis of Mobility and Sharing of WSNs By IP Applications
"... License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple ..."
Abstract
- Add to MetaCart
in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe which mobility support can best be used in different scenarios, and how shared usage of mobile WSANs by multiple IP applications can best be scaled up. This paper
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
"... Abstract—Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatu ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a secure and efficient threshold-multisignature scheme. The paper uniquely defines
Results 1 - 10
of
73