×

Found 73 Documents (Results 1–73)

Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. (English) Zbl 1403.94070

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 403-423 (2015).
MSC:  94A60
Full Text: DOI

Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors. (English) Zbl 1347.94050

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 217-235 (2014).
MSC:  94A60 14G50

Ambiguous one-move nominative signature without random oracles. (English) Zbl 1352.94050

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 325-341 (2014).
MSC:  94A60 94A62
Full Text: DOI

P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures. (English) Zbl 1337.94097

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 367-384 (2014).
MSC:  94A62
Full Text: DOI

Practical distributed signatures in the standard model. (English) Zbl 1337.94103

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 307-326 (2014).
MSC:  94A62
Full Text: DOI

A CCA-secure identity-based conditional proxy re-encryption without random oracles. (English) Zbl 1342.68124

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 231-246 (2013).
MSC:  68P25 94A60
Full Text: DOI

Touch gestures based biometric authentication scheme for touchscreen mobile phones. (English) Zbl 1311.94108

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 331-350 (2013).
MSC:  94A62 68P25
Full Text: DOI

The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. (English) Zbl 1290.94089

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 120-137 (2012).
MSC:  94A60
Full Text: DOI

Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. (English) Zbl 1477.68061

Atluri, Vijay (ed.) et al., Computer security – ESORICS 2011. 16th European symposium on research in computer security, Leuven, Belgium, September 12–14, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6879, 278-297 (2011).
MSC:  68M25 94A60
Full Text: DOI

Oblivious transfer with access control: realizing disjunction without duplication. (English) Zbl 1287.94107

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 96-115 (2010).
MSC:  94A60 68N17
Full Text: DOI

A new construction of designated confirmer signature and its application to optimistic fair exchange (extended abstract). (English) Zbl 1287.94112

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 41-61 (2010).
MSC:  94A62 94A60
Full Text: DOI

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract). (English) Zbl 1286.94099

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 166-183 (2010).
MSC:  94A62 94A60
Full Text: DOI

Probabilistic public key encryption with equality test. (English) Zbl 1271.94028

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 119-131 (2010).
MSC:  94A60

Efficient non-interactive range proof. (English) Zbl 1248.94098

Ngo, Hung Q. (ed.), Computing and combinatorics. 15th annual international conference, COCOON 2009, Niagara Falls, NY, USA, July 13–15, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02881-6/pbk). Lecture Notes in Computer Science 5609, 138-147 (2009).
MSC:  94A60

Ambiguous optimistic fair exchange. (English) Zbl 1206.94075

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 74-89 (2008).
MSC:  94A60 94A62
Full Text: DOI

Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1319.94092

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 224-241 (2008).
MSC:  94A62 68P25
Full Text: DOI

Traceable and retrievable identity-based encryption. (English) Zbl 1319.94051

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 94-110 (2008).
MSC:  94A60

Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. (English) Zbl 1153.94394

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 106-120 (2008).
MSC:  94A60

Formal definition and construction of nominative signature. (English) Zbl 1285.94108

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 57-68 (2008).
MSC:  94A62
Full Text: DOI

An efficient password-only two-server authenticated key exchange system. (English) Zbl 1285.94106

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 44-56 (2008).
MSC:  94A62 68P25
Full Text: DOI

A more natural way to construct identity-based identification schemes. (English) Zbl 1214.94057

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 307-322 (2007).
MSC:  94A60 94A62

On the generic and efficient constructions of secure designated confirmer signatures. (English) Zbl 1127.94028

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 43-60 (2007).
MSC:  94A62
Full Text: DOI

Key replacement attack against a generic construction of certificateless signature. (English) Zbl 1176.94044

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 235-246 (2006).
MSC:  94A60 94A62 68P25
Full Text: DOI

Universal custodian-hiding verifiable encryption for discrete logarithms. (English) Zbl 1185.94057

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 389-409 (2006).
MSC:  94A60
Full Text: DOI

Certificateless public-key signature: Security model and efficient construction. (English) Zbl 1151.94638

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 293-308 (2006).
MSC:  94A62
Full Text: DOI

Anonymous signature schemes. (English) Zbl 1151.94587

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 347-363 (2006).
MSC:  94A60 94A62
Full Text: DOI

Session corruption attack and improvements on encryption based MT-authenticators. (English) Zbl 1125.94337

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 34-51 (2006).
MSC:  94A62
Full Text: DOI

Separable linkable threshold ring signatures. (English) Zbl 1113.94326

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 384-398 (2004).
MSC:  94A62
Full Text: DOI

Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). (English) Zbl 1098.94624

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 325-335 (2004).
MSC:  94A60 94A62 68P25
Full Text: DOI

Efficient and mutually authenticated key exchange for low power computing devices. (English) Zbl 1067.94567

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 272-289 (2001).
MSC:  94A60 94A62 68P25

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software