Key-aggregate cryptosystem for scalable data sharing in cloud storage
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
Securing low-cost RFID systems: An unconditionally secure approach
In this paper, we explore a new direction towards solving the identity authentication problem
in RFID systems. We break the RFID authentication process into two main problems …
in RFID systems. We break the RFID authentication process into two main problems …
The power of primes: security of authentication based on a universal hash-function family
Message authentication codes (MACs) based on universal hash-function families are
becoming increasingly popular due to their fast implementation. In this paper, we investigate …
becoming increasingly popular due to their fast implementation. In this paper, we investigate …
Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing
S Patranabis, Y Shrivastava… - Progress in Cryptology …, 2015 - Springer
The recent advent of cloud computing and the IoT has made it imperative to have efficient
and secure cryptographic schemes for online data sharing. Data owners would ideally want …
and secure cryptographic schemes for online data sharing. Data owners would ideally want …
On an almost-universal hash function family with applications to authentication and secrecy codes
Universal hashing, discovered by Carter and Wegman in 1979, has many important
applications in computer science. MMH∗, which was shown to be Δ-universal by Halevi and …
applications in computer science. MMH∗, which was shown to be Δ-universal by Halevi and …
Revocable Key‐Aggregate Cryptosystem for Data Sharing in Cloud
With the rapid development of network and storage technology, cloud storage has become a
new service mode, while data sharing and user revocation are important functions in the …
new service mode, while data sharing and user revocation are important functions in the …
[图书][B] Restricted congruences in computing
K Bibak - 2020 - taylorfrancis.com
Congruences are ubiquitous in computer science, engineering, mathematics, and related
areas. Developing techniques for finding (the number of) solutions of congruences is an …
areas. Developing techniques for finding (the number of) solutions of congruences is an …
Coprime solutions to ax≡b (mod n)
O Grošek, Š Porubský - Journal of Mathematical Cryptology, 2013 - degruyter.com
It is well known that a congruence ax≡ b (mod n) has a solution if and only if, and, if the
condition is satisfied, the number of incongruent solutions equals. In 2010, Alomair, Clark …
condition is satisfied, the number of incongruent solutions equals. In 2010, Alomair, Clark …
Information-leakage in hybrid randomized protocols
S Rass, P Schartner - Proceedings of the International …, 2011 - ieeexplore.ieee.org
In light of the vast number of existing cryptographic protocols, performance tradeoffs become
a major obstacle when selecting one for practical usage. For instance, protocols known to be …
a major obstacle when selecting one for practical usage. For instance, protocols known to be …
Distributed symmetric key exchange: a scalable, quantum-proof key distribution system
HK Lo, M Montagna, M von Willich - arXiv e-prints, 2022 - ui.adsabs.harvard.edu
We propose and implement a protocol for a scalable, cost-effective, information-theoretically
secure key distribution and management system. The system, called Distributed Symmetric …
secure key distribution and management system. The system, called Distributed Symmetric …