Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such protocols, allowed us to …
In this paper, we investigate a new concept, called share selectable secret sharing, where no unauthorized set can obtain information of the secret (in the information-theoretic sense) …
A Siad, M Amara - Journal of Systems and Software, 2016 - Elsevier
Abstract Identity-Based Encryption (IBE) suffers from the problem of trust in the Private Key Generator (PKG), which translates into the ability of the PKG to produce and distribute …
A Siad - IFIP International Conference on Communications and …, 2012 - Springer
Abstract Public-key Encryption with Keyword Search (PEKS) allows authorized users to search by keywords on encrypted data by generating trapdoors for the desired keywords …
L Guo, G Yao - Applied Mechanics and Materials, 2013 - Trans Tech Publ
An authentication protocol is a procedure by which a sender tries to convey n bits of information, which we call an input message, to a receiver. An adversary controls the …