![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A New Framework for Privacy of RFID Path Authentication
RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag’s movement along a designed or an arbitr...
-
Chapter and Conference Paper
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
In ACM CCS 2007, Canetti and Hohenberger left an interesting open problem of how to construct a chosen-ciphertext secure proxy re-encryption (PRE) scheme without bilinear maps. This is a rather interesting pro...
-
Chapter and Conference Paper
Hierarchical Identity-Based Chameleon Hash and Its Applications
At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegat...
-
Chapter and Conference Paper
Deniable Internet Key Exchange
In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet key-exchange (DIKE). The newly developed DIKE protocols are of conceptual clar...
-
Chapter and Conference Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model
We present a generic construction for constant-round concurrsound resettable zero-knowledge (rZK-CS) arguments for \(\mathcal{NP}\) ...