[PDF][PDF] Resisting Traitors in Linkable Democratic Group Signatures.

MH Ibrahim - Int. J. Netw. Secur., 2009 - researchgate.net
Linkable democratic group signatures (LDGS)[29] allow every member of a group to trace
the identity of any other member who issued a signature while non-members (with the help …

[PDF][PDF] Efficient Dealer-Less Threshold Sharing of Standard RSA.

MH Ibrahim - Int. J. Netw. Secur., 2009 - ijns.jalaxy.com.tw
Abstract In [15] an efficient two-party, two-prime RSA function sharing protocol was
proposed. The protocol proves efficiency over previously proposed protocols. When the …

[PDF][PDF] Secure and robust enterprise digital rights management protocol with efficient storage

MH Ibrahim - Int J Inf, 2015 - Citeseer
In the digital world, protection against information theft by unauthorized entities is the most
demanding services for enterprise business organizations. Although firewalls and intrusion …

[PDF][PDF] Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing.

MH Ibrahim - Int. J. Netw. Secur., 2008 - academia.edu
The nature of the RSA public modulus N as a composite of at least two secret large primes
was always considered as a major obstacle facing the RSA function sharing without the help …

Improving security and efficiency of enterprise digital rights management

AH Soliman, MH Ibrahim… - 2015 6th International …, 2015 - ieeexplore.ieee.org
Recently, private enterprises, governmental and military institutions have been relied mainly
on digitizing their work. Digital files containing sensitive information should be protected …

Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation

H Park, DK Kim - IEICE TRANSACTIONS on Information and …, 2011 - search.ieice.org
A safe prime p is a prime such that (p-1)/2 is also a prime. A primality test or a safe primality
test is normally a combination of trial division and a probabilistic primality test. Since the …

Verifiable threshold sharing of a large secret safe-prime

MH Ibrahi - … on Information Technology: Coding and Computing …, 2005 - ieeexplore.ieee.org
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the
players are sharing a unique secret and this secret is the secret originally distributed by the …

Noninteractive, anonymously authenticated, and traceable message transmission for VANETs

MH Ibrahim - International Journal of Vehicular Technology, 2009 - Wiley Online Library
Unlike sensor and other ad‐hoc wireless networks, vehicular ad‐hoc networks (VANETs)
are characterized by its high mobility which allows a very short communication interval …

Undeniable Organizational Signature Scheme without a Trusted Party

FM Salem - International Journal of Applied Information Systems, 2019 - ijais.org
Organizational signature is a new kind of digital signature introduced to facilitate and
guarantee legitimacy of transactions among organizations. It allows employee in the …

[PDF][PDF] Design of Efficient Robust and Secure Digital Rights Management Protocols

AHAH Soliman - 2016 - researchgate.net
A complete E-DRM system with two main protocols is proposed. The proposed E-DRM
protocols are analyzed to prove its security, efficiency, and robustness. A software …