Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Gregory Neven"'
Publikováno v:
EuroS&P
Vehicle-to-vehicle (V2V) communication systems are currently being prepared for real-world deployment, but they face strong opposition over privacy concerns. Position beacon messages are the main culprit, being broadcast in cleartext and pseudonymous
Publikováno v:
Security and Cryptography for Networks-12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Cryptography for Networks
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Cryptography for Networks
Traditional group signatures feature a single issuer who can add users to the group of signers and a single opening authority who can reveal the identity of the group member who computed a signature. Interestingly, despite being designed for privacy-
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030215675
ACNS
ACNS
We introduce password-authenticated public-key encryption (PAPKE), a new cryptographic primitive. PAPKE enables secure end-to-end encryption between two entities without relying on a trusted third party or other out-of-band mechanisms for authenticat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5600abb965d174f914e4862a567f6a77
https://doi.org/10.1007/978-3-030-21568-2_22
https://doi.org/10.1007/978-3-030-21568-2_22
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
Applied Cryptography and Network Security ISBN: 9783319933863
ACNS
Applied Cryptography and Network Security
Lecture Notes in Computer Science-Applied Cryptography and Network Security
Applied Cryptography and Network Security ISBN: 9783319933863
ACNS
Applied Cryptography and Network Security
We present the first lattice-based group signature scheme whose cryptographic artifacts are of size small enough to be usable in practice: for a group of225225users, signatures take 910 kB and public keys are 501 kB. Our scheme builds upon two recent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1a5004c85dbb93f0114fec836b58fb97
https://zenodo.org/record/3260096
https://zenodo.org/record/3260096
Publikováno v:
Developments in Language Theory ISBN: 9783319986531
ISC
ISC
Advanced cryptographic protocols such as anonymous credentials, voting schemes, and e-cash are typically constructed by suitably combining signature, commitment, and encryption schemes with zero-knowledge proofs. Indeed, a large body of protocols hav
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c716bb53a0a8c6c61371a52fa14ecd45
https://doi.org/10.1007/978-3-319-99136-8_1
https://doi.org/10.1007/978-3-319-99136-8_1
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
ASIACRYPT (2)
We construct new multi-signature schemes that provide new functionality. Our schemes are designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings where multi-signatures are needed. All our constructions support bot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::212def839766e01b15fa5979d0a36938
https://doi.org/10.1007/978-3-030-03329-3_15
https://doi.org/10.1007/978-3-030-03329-3_15
Publikováno v:
Advances in Cryptology – EUROCRYPT 2018 ISBN: 9783319783802
EUROCRYPT (1)
EUROCRYPT (1)
The random-oracle model by Bellare and Rogaway (CCS’93) is an indispensable tool for the security analysis of practical cryptographic protocols. However, the traditional random-oracle model fails to guarantee security when a protocol is composed wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c48ea1a0a7353d9150bb782bfb7f8d30
https://doi.org/10.1007/978-3-319-78381-9_11
https://doi.org/10.1007/978-3-319-78381-9_11
Publikováno v:
VNC
In Cooperative Intelligent Transport Systemss (C-ITSs), vehicles broadcast their location and other information over dedicated short-range radio channels. This communication must be authenticated to protect the information against tampering, but at t
Publikováno v:
CCS
We propose a lattice-based electronic voting scheme, EVOLVE (Electronic Voting from Lattices with Verification), which is conjectured to resist attacks by quantum computers. Our protocol involves a number of voting authorities so that vote privacy is
Publikováno v:
CSF
The universal composability (UC) framework enables the modular design of cryptographic protocols by allowing arbitrary compositions of lower-level building blocks. Public-key encryption is unarguably a very important such building block. However, so