×

Found 64 Documents (Results 1–64)

Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction. (English) Zbl 1388.94040

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 149-166 (2015).
MSC:  94A60
Full Text: DOI

Constant size ring signature without random oracle. (English) Zbl 1368.94086

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 230-247 (2015).
MSC:  94A60
Full Text: DOI

Efficient code based hybrid and deterministic encryptions in the standard model. (English) Zbl 1445.94027

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, South Korea, November 27–29, 2013. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8565, 517-535 (2014).
MSC:  94A60 68P25
Full Text: DOI

A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English) Zbl 1352.94053

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014).
MSC:  94A60
Full Text: DOI

Anonymous identity-based identification scheme in ad-hoc groups without pairings. (English) Zbl 1355.94046

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 130-146 (2013).
MSC:  94A60
Full Text: DOI

Identity-based identification schemes from ID-kems. (English) Zbl 1355.94045

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 111-129 (2013).
MSC:  94A60
Full Text: DOI

Efficient, pairing-free, authenticated identity based key agreement in a single round. (English) Zbl 1319.94095

Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23–25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
MSC:  94A62
Full Text: DOI

Compact stateful encryption schemes with ciphertext verifiability. (English) Zbl 1292.94141

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 87-104 (2012).
MSC:  94A60 68P25
Full Text: DOI

Adaptively secure efficient lattice (H)IBE in standard model with short public parameters. (English) Zbl 1312.94093

Bogdanov, Andrey (ed.) et al., Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34415-2/pbk). Lecture Notes in Computer Science 7644, 153-172 (2012).
MSC:  94A60
Full Text: DOI

ID based signcryption scheme in standard model. (English) Zbl 1303.94102

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 35-52 (2012).
MSC:  94A60 94A62
Full Text: DOI

Deterministic identity based signature scheme and its application for aggregate signatures. (English) Zbl 1308.94101

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 280-293 (2012).
MSC:  94A62 94A60
Full Text: DOI

An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model. (English) Zbl 1305.94074

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 166-179 (2012).
MSC:  94A60
Full Text: DOI

A code-based 1-out-of-\(N\) oblivious transfer based on McEliece assumptions. (English) Zbl 1291.94143

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 144-157 (2012).
MSC:  94A60 68P25 94A62
Full Text: DOI

Identity-based deterministic signature scheme without forking-lemma. (English) Zbl 1344.94084

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 79-95 (2011).
MSC:  94A62
Full Text: DOI

The round complexity of verifiable secret sharing: the statistical case. (English) Zbl 1294.94096

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 431-447 (2010).
MSC:  94A62
Full Text: DOI

Communication efficient statistical asynchronous multiparty computation with optimal resilience. (English) Zbl 1281.94102

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 179-197 (2010).
MSC:  94C12 94A17 94A62
Full Text: DOI

Breaking and building of threshold signcryption schemes. (English) Zbl 1281.94089

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 108-123 (2010).
MSC:  94A62
Full Text: DOI

Sanitizable signatures with strong transparency in the standard model. (English) Zbl 1281.94068

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 93-107 (2010).
MSC:  94A62
Full Text: DOI

Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. (English) Zbl 1281.94090

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 75-92 (2010).
MSC:  94A62
Full Text: DOI

Efficient statistical asynchronous verifiable secret sharing with optimal resilience. (English) Zbl 1282.94063

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 74-92 (2010).
MSC:  94A60 68M14
Full Text: DOI

Communication optimal multi-valued asynchronous broadcast protocol. (English) Zbl 1285.94091

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 162-177 (2010).
MSC:  94A60
Full Text: DOI

Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience. (English) Zbl 1284.94144

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 184-202 (2010).
MSC:  94A62 68M10 68M12
Full Text: DOI

Round efficient unconditionally secure MPC and multiparty set intersection with optimal resilience. (English) Zbl 1273.94356

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 398-417 (2009).
MSC:  94A60
Full Text: DOI

Identity based aggregate signcryption schemes. (English) Zbl 1252.94096

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 378-397 (2009).
MSC:  94A60 94A62
Full Text: DOI

Information theoretically secure multi party set intersection re-visited. (English) Zbl 1267.94090

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 71-91 (2009).
MSC:  94A60
Full Text: DOI

On exponential lower bound for protocols for reliable communication in networks. (English) Zbl 1263.68027

Desmedt, Yvo (ed.), Information theoretic security. Second international conference, ICITS 2007, Madrid, Spain, May 25–29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10229-5/pbk). Lecture Notes in Computer Science 4883, 89-98 (2009).
MSC:  68M12 68Q17 94A62
Full Text: DOI

Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security. (English) Zbl 1287.94097

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 21-40 (2009).
MSC:  94A60 68P25
Full Text: DOI

An efficient identity-based signcryption scheme for multiple receivers. (English) Zbl 1287.94099

Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 71-88 (2009).
MSC:  94A60
Full Text: DOI

The round complexity of verifiable secret sharing revisited. (English) Zbl 1252.94110

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 487-504 (2009).
MSC:  94A62
Full Text: DOI

On minimal connectivity requirement for secure message transmission in asynchronous networks. (English) Zbl 1365.94418

Garg, Vijay (ed.) et al., Distributed computing and networking. 10th international conference, ICDCN 2009, Hyderabad, India, January 3–6, 2009. Proceedings. Berlin: Springer (ISBN 978-3-540-92294-0/pbk). Lecture Notes in Computer Science 5408, 148-162 (2009).
MSC:  94A60 68M12 68M14
Full Text: DOI

Cryptanalysis of Mu et al.’s and Li et al.’s schemes and a provably secure ID-based broadcast signcryption (IBBSC) scheme. (English) Zbl 1352.94060

Chung, Kyo-Il (ed.) et al., Information security applications. 9th international workshop, WISA 2008, Jeju Island, Korea, September 23–25, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-00305-9/pbk). Lecture Notes in Computer Science 5379, 115-129 (2009).
MSC:  94A60
Full Text: DOI

Efficient single phase unconditionally secure message transmission with optimum communication complexity. (English) Zbl 1428.94093

Proceedings of the 27th annual ACM symposium on principles of distributed computing, PODC ’08, Toronto, Canada, August 18–21, 2008. New York, NY: Association for Computing Machinery (ACM). 457 (2008).
MSC:  94A60 68P30
Full Text: DOI

On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. (English) Zbl 1301.94105

Proceedings of the 27th annual ACM symposium on principles of distributed computing, PODC ’08, Toronto, Canada, August 18–21, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-989-0). 115-124 (2008).
Full Text: DOI

Unconditionally reliable message transmission in directed networks. (English) Zbl 1192.68078

Proceedings of the nineteenth annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, January 20–22, 2008. New York, NY: Association for Computing Machinery (ACM); Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 978-0-898716-47-4). 1048-1055 (2008).

Efficient and provably secure certificateless multi-receiver signcryption. (English) Zbl 1204.94077

Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 52-67 (2008).
MSC:  94A60 94A62
Full Text: DOI

Round efficient unconditionally secure multiparty computation protocol. (English) Zbl 1203.94118

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 185-199 (2008).
MSC:  94A60 94A62
Full Text: DOI

Perfectly reliable and secure communication tolerating static and mobile mixed adversary. (English) Zbl 1162.94323

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 137-155 (2008).
Full Text: DOI

Unconditionally reliable and secure message transmission in directed networks revisited. (English) Zbl 1180.94061

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 309-326 (2008).
MSC:  94A60 68M12
Full Text: DOI

Efficient perfectly reliable and secure message transmission tolerating mobile adversary. (English) Zbl 1279.94111

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 170-186 (2008).
MSC:  94A60
Full Text: DOI

Constant phase efficient protocols for secure message transmission in directed networks. (English) Zbl 1283.94080

Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 322-323 (2007).
Full Text: DOI

Perfectly secure message transmission in directed networks tolerating threshold and non threshold adversary. (English) Zbl 1282.94008

Bao, Feng (ed.) et al., Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). Lecture Notes in Computer Science 4856, 80-101 (2007).
Full Text: DOI

Probabilistic perfectly reliable and secure message transmission – possibility, feasibility and optimality. (English) Zbl 1153.68325

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 101-122 (2007).
Full Text: DOI

Constant phase bit optimal protocols for perfectly reliable and secure message transmission. (English) Zbl 1175.94095

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 221-235 (2006).
MSC:  94A60 68M12
Full Text: DOI

Round-optimal and efficient verifiable secret sharing. (English) Zbl 1112.94028

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 329-342 (2006).
MSC:  94A62
Full Text: DOI

On the power of computational secret sharing. (English) Zbl 1123.94382

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 162-176 (2003).
MSC:  94A62 68Q15
Full Text: DOI

Non-perfect secret sharing over general access structures. (English) Zbl 1033.94540

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 409-421 (2002).
MSC:  94A60 94C05

Asynchronous unconditionally secure computation: An efficiency improvement. (English) Zbl 1033.94538

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 93-107 (2002).
MSC:  94A60 94A62

Asynchronous secure communication tolerating mixed adversaries. (English) Zbl 1065.94558

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 224-242 (2002).
MSC:  94A60 94A05
Full Text: DOI

Filter Results by …

Access

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software