Abstract
Peter G. Neumann views computers and their related issues holistically.
Index Terms
- Q&A: Securing the Risk
Recommendations
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen cipher text attack is a requirement. However, prior to the results presented here, there appeared to be no practical threshold cryptosystems in the literature that ...
New Signcryption from q-Diffie-Hellman Problems
CMC '10: Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01Recently, Libert and Quisquater proposed an efficient signcryption scheme based on the hardness of q-Diffie- Hellman problems in Gap Diffie-Hellman groups. Their scheme is quite efficient: the signcryption operation has almost the same cost as an ...
Comments