Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security (Englisch)
- Neue Suche nach: Nguyen, L.
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Kurosawa, K.
- Neue Suche nach: International Communications and Information Security Association
- Neue Suche nach: Nguyen, L.
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Kurosawa, K.
- Neue Suche nach: Jakobsson, Markus
- Neue Suche nach: Yung, Moti
- Neue Suche nach: Zhou, Jianying
- Neue Suche nach: International Communications and Information Security Association
In:
Applied cryptography and network security: second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, proceedings /
;
61-75
;
2004
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security
-
Beteiligte:Nguyen, L. ( Autor:in ) / Safavi-Naini, R. ( Autor:in ) / Kurosawa, K. ( Autor:in ) / Jakobsson, Markus / Yung, Moti / Zhou, Jianying / International Communications and Information Security Association
-
Kongress:International workshop; 2nd, Applied cryptography and network security: second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, proceedings / ; 2004 ; Yellow Mountain, China
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin , London
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:15 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the CheapLocasto, M. E. / Keromytis, A. D. / International Communications and Information Security Association et al. | 2004
- 16
-
Private Keyword-Based Push and Pull with Applications to Anonymous CommunicationKissner, L. / Oprea, A. / Reiter, M. K. / Song, D. / Yang, K. / International Communications and Information Security Association et al. | 2004
- 31
-
Secure Conjunctive Keyword Search over Encrypted DataGolle, P. / Staddon, J. / Waters, B. / International Communications and Information Security Association et al. | 2004
- 46
-
Evaluating Security of Voting Schemes in the Universal Composability FrameworkGroth, J. / International Communications and Information Security Association et al. | 2004
- 61
-
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable SecurityNguyen, L. / Safavi-Naini, R. / Kurosawa, K. / International Communications and Information Security Association et al. | 2004
- 76
-
On the Security of Cryptosystems with All-or-Nothing TransformZhang, R. / Hanaoka, G. / Imai, H. / International Communications and Information Security Association et al. | 2004
- 91
-
Centralized Management of Virtual Security Zones in IP NetworksPeltonen, A. / Virtanen, T. / Turtiainen, E. / International Communications and Information Security Association et al. | 2004
- 103
-
S-RIP: A Secure Distance Vector Routing ProtocolWan, T. / Kranakis, E. / van Oorschot, P. C. / International Communications and Information Security Association et al. | 2004
- 120
-
A Pay-per-Use DoS Protection Mechanism for the WebStavrou, A. / Ioannidis, J. / Keromytis, A. D. / Misra, V. / Rubenstein, D. / International Communications and Information Security Association et al. | 2004
- 135
-
Limited Verifier Signature from Bilinear PairingsChen, X. / Zhang, F. / Kim, K. / International Communications and Information Security Association et al. | 2004
- 149
-
Deniable Ring Authentication RevisitedSusilo, W. / Mu, Y. / International Communications and Information Security Association et al. | 2004
- 164
-
A Fully-Functional Group Signature Scheme over Only Known-Order GroupMiyaji, A. / Umeda, K. / International Communications and Information Security Association et al. | 2004
- 180
-
Some Observations on Zap and Its ApplicationsZhao, Y. / Lee, C. H. / Zhu, H. / International Communications and Information Security Association et al. | 2004
- 194
-
Security Measurements of Steganographic SystemsZhang, W. / Li, S. / International Communications and Information Security Association et al. | 2004
- 205
-
X^2Rep: Enhanced Trust Semantics for the XRep ProtocolCurtis, N. / Safavi-Naini, R. / Susilo, W. / International Communications and Information Security Association et al. | 2004
- 220
-
One-Round Protocols for Two-Party Authenticated Key ExchangeJeong, I. R. / Katz, J. / Lee, D. H. / International Communications and Information Security Association et al. | 2004
- 233
-
Password Authenticated Key Exchange Using Quadratic ResiduesZhang, M. / International Communications and Information Security Association et al. | 2004
- 248
-
Key Agreement Using Statically Keyed AuthenticatorsBoyd, C. / Mao, W. / Paterson, K. G. / International Communications and Information Security Association et al. | 2004
- 263
-
Low-Latency Cryptographic Protection for SCADA CommunicationsWright, A. K. / Kinast, J. A. / McCarty, J. / International Communications and Information Security Association et al. | 2004
- 278
-
A Best Practice for Root CA Key Update in PKIJeun, I. / Park, J. / Choi, T. / Park, S. / Park, B. / Lee, B. / Shin, Y. / International Communications and Information Security Association et al. | 2004
- 292
-
SQLrand: Preventing SQL Injection AttacksBoyd, S. W. / Keromytis, A. D. / International Communications and Information Security Association et al. | 2004
- 303
-
Cryptanalysis of a Knapsack Based Two-Lock CryptosystemZhang, B. / Wu, H. / Feng, D. / Bao, F. / International Communications and Information Security Association et al. | 2004
- 310
-
Success Probability in chi^2-AttacksMatsunaka, T. / Miyaji, A. / Takano, Y. / International Communications and Information Security Association et al. | 2004
- 326
-
More Generalized Clock-Controlled Alternating Step GeneratorKanso, A. A. / International Communications and Information Security Association et al. | 2004
- 339
-
FDLKH: Fully Decentralized Key Management Scheme on Logical Key HierarchyInoue, D. / Kuroda, M. / International Communications and Information Security Association et al. | 2004
- 355
-
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based ModelNascimento, A. C. A. / Mueller-Quade, J. / Otsuka, A. / Hanaoka, G. / Imai, H. / International Communications and Information Security Association et al. | 2004
- 369
-
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True AnonymityGoi, B.-M. / Phan, R. C.-W. / Yang, Y. / Bao, F. / Deng, R. H. / Siddiqi, M. U. / International Communications and Information Security Association et al. | 2004
- 383
-
Security Analysis of CRT-Based CryptosystemsOkeya, K. / Takagi, T. / International Communications and Information Security Association et al. | 2004
- 398
-
Cryptanalysis of the Countermeasures Using Randomized Binary Signed DigitsHan, D.-G. / Okeya, K. / Kim, T. H. / Hwang, Y. S. / Park, Y.-H. / Jung, S. / International Communications and Information Security Association et al. | 2004
- 414
-
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different PasswordsWang, S. / Wang, J. / Xu, M. / International Communications and Information Security Association et al. | 2004
- 426
-
Advanced Packet Marking Mechanism with Pushback for IP TracebackLee, H.-W. / International Communications and Information Security Association et al. | 2004
- 439
-
A Parallel Intrusion Detection System for High-Speed NetworksLai, H. / Cai, S. / Huang, H. / Xie, J. / Li, H. / International Communications and Information Security Association et al. | 2004
- 452
-
A Novel Framework for Alert Correlation and UnderstandingYu, D. / Frincke, D. / International Communications and Information Security Association et al. | 2004
- 467
-
An Improved Algorithm for uP + vQ Using JSF~3^1Kuang, B. / Zhu, Y. / Zhang, Y. / International Communications and Information Security Association et al. | 2004
- 479
-
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p^n)Sarkar, P. / Mishra, P. K. / Barua, R. / International Communications and Information Security Association et al. | 2004
- 494
-
Batch Verification for Equality of Discrete Logarithms and Threshold DecryptionsAditya, R. / Peng, K. / Boyd, C. / Dawson, E. / Lee, B. / International Communications and Information Security Association et al. | 2004