Financial Cryptography and Data Security
FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
Article
Smart meters inform the electricity suppliers about the consumption of their clients in short intervals. Fine-grained electricity consumption information is highly sensitive as it has been proven to permit to ...
Article
In this paper we study the difference between the 2-adic valuations of the cardinalities \( \# E( \mathbb {F}_{q^k} ) \) ...
Article
Article
We give a brief overview of a recent branch of Public Key Cryptography, the so called Pairing-based Cryptography or Identity-based Cryptography. We describe the Weil pairing and its applications to cryptosyste...
Article
Vector-based homomorphic tallying remote voting schemes provide an efficient protocol for vote tallying, but they require voters to prove in zero-knowledge that the ballots they cast have been properly generat...
Article
Let E be an elliptic curve defined over a finite field \({\mathbb{F}_{q}}\) ...
Article
An almost Moore (d, k)-digraph is a regular digraph of degree \({d > 1}\) ...
Chapter and Conference Paper
Given an ordinary elliptic curve over a finite field located in the floor of its volcano of \( \ell \) -isogenies, we ...
Chapter and Conference Paper
The homomorphic tallying paradigm provides efficient e-voting solutions when implemented using the multiplicative homomorphic property of the ElGamal cryptosystem. However, that is not the case when implemente...
Article
In this paper, an ad-hoc public-key cryptosystem recently proposed to implement a general countermeasure to relation attacks in mix-based e-voting is shown to be weak in the sense that the secret key is easily...
Chapter and Conference Paper
In this paper we present a mix-type remote electronic voting system belonging to the “proof of product with redundancy” paradigm. Votes are composed using a redundancy system that permits to prove the correct ...
Book and Conference Proceedings
FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
Chapter and Conference Paper
Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and ...
Article
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence,...
Article
We give a compactification of the varietyU of non-degenerate plane cuspidal cubics of ℙ3. We construct this compactification by means of the projective bundleX of a suitable vector bundleE. We describe the inters...
Article
In this note one defines a stratification of the variety of rational curves inP n of given degree in terms of the decomposition of the normal bundle (see [E-vdV], [G-S] for the casen=3). The strat...