![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Design and Security Analysis of Anonymous Group Identification Protocols
Two provably secure group identification schemes are presented in this report: 1) we extend De Santis, Crescenzo and Persiano’s (SCP) anonymous group identification scheme to the discrete logarithm based case;...
-
Chapter and Conference Paper
A Novel Two-Level Trust Model for Grid
Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhance the security by the Grid Security In...
-
Chapter and Conference Paper
Variations of Diffie-Hellman Problem
This paper studies various computational and decisional Diffie-Hellman problems by providing reductions among them in the high granularity setting. We show that all three variations of computational Diffie-Hel...
-
Chapter and Conference Paper
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construction is that given any valid partial sig...
-
Chapter and Conference Paper
Analysis and Improvement of Micali’s Fair Contract Signing Protocol
In PODC 2003, Micali presented a fair electronic exchange protocol for contract signing with an invisible trusted party [17]. The protocol was filed as a US patent No 5666420 in 1997 [16]. In the protocol, two...
-
Chapter and Conference Paper
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels. However, by fixing the packets in transmission, an...
-
Chapter and Conference Paper
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery ...
-
Chapter and Conference Paper
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be trans...
-
Chapter and Conference Paper
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
In this paper, we first introduce a new notion called augmented oblivious polynomial evaluation (AOPE), a useful notion to deal with the general oblivious polynomial evaluation protocol. And then we propose a ...
-
Chapter and Conference Paper
A Novel Construction of Two-Party Private Bidding Protocols from Yao’s Millionaires Problem
In this paper, a new bidding protocol (in essence, it is Yao’s millionaires problem) is implemented. We show that our implementation is provably secure in the common reference string model assuming that a stat...
-
Chapter and Conference Paper
Efficient Group Signatures from Bilinear Pairing
This paper presents two types of group signature schemes from bilinear pairings: the mini type and the improved type. The size of the group public keys and the length of the signatures in both schemes are constan...
-
Chapter and Conference Paper
A MPC and Genetic Algorithm Based Approach for Multiple UAVs Cooperative Search
This paper focuses on the problem of cooperative search using a team of Unmanned Aerial vehicles (UAVs). The objective is to visit as many unknown area as possible, while avoiding collision. We present an appr...
-
Chapter and Conference Paper
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains
The contribution of this paper has two folds. In the first fold, we propose a generic construction of sequential aggregate signatures from families of certificated trapdoor one-way permutations. We show that o...
-
Chapter and Conference Paper
More on Shared-Scalar-Product Protocols
Secure scalar product protocols provide fundamental security components for distributed data mining with privacy concerns. This paper makes two contributions in the shared-scalar-product protocols. In the firs...
-
Chapter and Conference Paper
Stand-Alone and Setup-Free Verifiably Committed Signatures
In this paper, a novel construction of stand-alone and setup-free verifiably committed signatures from RSA – an open problem advertised by Dodis and Reyzin in their speech [16] is presented. The methodology us...
-
Chapter and Conference Paper
Computing of Trust in Ad-Hoc Networks
Although, the notion of trust has been considered as a primitive for establishing relationships among nodes in ad-hoc networks, syntax and metrics of trust are not well defined. This paper studies computing of...
-
Chapter and Conference Paper
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)
At PODC’05, Subramanian, Katz, Roth, Shenker and Stoica (SKRSS) introduced and formulated a new theoretical problem called reliable broadcast problems in unknown fixed-identity networks [3] and further propose...
-
Chapter and Conference Paper
Oblivious Scalar-Product Protocols
In this paper, a new notion which we call oblivious scalar-product protocols is introduced and formalized. We then propose an efficient implementation of oblivious scalar-product protocols based on homomorphic...
-
Chapter and Conference Paper
More on Stand-Alone and Setup-Free Verifiably Committed Signatures
Two notions regarding fair exchange protocols have been introduced and formalized in the literature – one is verifiably encrypted signatures; the other is verifiably committed signatures. Thus it is always int...
-
Chapter and Conference Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures
In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signatures in the multi-party setting. We the...