Unique group signatures

M Franklin, H Zhang - Computer Security–ESORICS 2012: 17th European …, 2012 - Springer
We initiate the study of unique group signature such that signatures of the same message by
the same user will always have a large common component (ie, unique identifier). It enables …

Composition of password-based protocols

C Chevalier, S Delaune, S Kremer… - Formal Methods in System …, 2013 - Springer
Formal and symbolic techniques are extremely useful for modelling and analysing security
protocols. They have helped to improve our understanding of such protocols, allowed us to …

Ideal secret sharing schemes with share selectability

K Emura, A Miyaji, A Nomura, MS Rahman… - … Conference, ICICS 2011 …, 2011 - Springer
In this paper, we investigate a new concept, called share selectable secret sharing, where
no unauthorized set can obtain information of the secret (in the information-theoretic sense) …

A new framework for implementing identity-based cryptosystems

A Siad, M Amara - Journal of Systems and Software, 2016 - Elsevier
Abstract Identity-Based Encryption (IBE) suffers from the problem of trust in the Private Key
Generator (PKG), which translates into the ability of the PKG to produce and distribute …

A new approach for private searches on public-key encrypted data

A Siad - IFIP International Conference on Communications and …, 2012 - Springer
Abstract Public-key Encryption with Keyword Search (PEKS) allows authorized users to
search by keywords on encrypted data by generating trapdoors for the desired keywords …

Protocols for Message Authentication from a Weak Secret

L Guo, G Yao - Applied Mechanics and Materials, 2013 - Trans Tech Publ
An authentication protocol is a procedure by which a sender tries to convey n bits of
information, which we call an input message, to a receiver. An adversary controls the …