Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

21 22 23
zadetkov: 228
221.
  • A Secure Traitor Tracing Scheme against Key Exposure
    Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki arXiv.org, 08/2005
    Paper
    Odprti dostop

    Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
222.
  • Toward an Easy-to-Understan... Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
    Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru Provable Security
    Book Chapter

    In this paper, we present a new public key encryption scheme which is proven chosen-ciphertext (CCA) secure under the decisional Diffie-Hellman (DDH) assumption. The main motivation behind this ...
Celotno besedilo
223.
  • A secure traitor tracing sc... A secure traitor tracing scheme against key exposure
    Ogawa, K.; Hanaoka, G.; Imai, H. Proceedings. International Symposium on Information Theory, 2005. ISIT 2005, 2005
    Conference Proceeding
    Odprti dostop

    Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure traitor tracing ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
224.
  • Round-Optimal Deniable Ring... Round-Optimal Deniable Ring Authentication in the Presence of Big Brother
    Dowsley, Rafael; Hanaoka, Goichiro; Imai, Hideki ... Information Security Applications
    Book Chapter

    In this work we propose a Deniable Ring Authentication scheme secure against a powerful Big Brother type of adversary and yielding an optimal number of communication rounds. Our scheme is based on an ...
Celotno besedilo
225.
Celotno besedilo

PDF
226.
  • A CDH-Based Strongly Unforg... A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
    Matsuda, Takahiro; Attrapadung, Nuttapong; Hanaoka, Goichiro ... Provable Security
    Book Chapter

    Unforgeability of digital signatures is closely related to the security of hash functions since hashing messages, such as hash-and-sign paradigm, is necessary in order to sign (arbitrarily) long ...
Celotno besedilo
227.
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
228.
  • Cryptography with informati... Cryptography with information theoretic security
    Imai, H.; Hanaoka, G.; Shikata, J. ... Proceedings of the IEEE Information Theory Workshop, 2002
    Conference Proceeding

    Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called, unconditionally secure (or information-theoretically secure) ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
21 22 23
zadetkov: 228

Nalaganje filtrov