Search Results

There are 1969 results for: content related to: Hash function-based secret sharing scheme designs

  1. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Sumit Kumar Debnath and Ratna Dutta

    Article first published online : 6 MAR 2016, DOI: 10.1002/sec.1450

  2. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

    Security and Communication Networks

    Yuyu Wang and Keisuke Tanaka

    Article first published online : 11 FEB 2016, DOI: 10.1002/sec.1436

  3. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1263

  4. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Article first published online : 1 JUN 2015, DOI: 10.1002/sec.1285

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing

    Security and Communication Networks

    Suqing Lin, Rui Zhang and Mingsheng Wang

    Article first published online : 10 FEB 2016, DOI: 10.1002/sec.1446

  7. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  8. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.606

  9. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Article first published online : 26 AUG 2015, DOI: 10.1002/sec.1331

  10. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2232–2243, Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Article first published online : 13 NOV 2014, DOI: 10.1002/sec.1166

  11. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  12. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  13. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Article first published online : 2 MAR 2016, DOI: 10.1002/sec.1444

  14. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Yanfei Guo and Zhenfeng Zhang

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.868

  15. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4098–4109, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Article first published online : 25 AUG 2015, DOI: 10.1002/sec.1326

  16. Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3323–3334, Yuan Chen and Qingkuan Dong

    Article first published online : 30 APR 2015, DOI: 10.1002/sec.1256

  17. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  18. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  19. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1223–1236, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Article first published online : 21 JUL 2014, DOI: 10.1002/sec.1076

  20. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650