enter search term and/or author name
Verifiable encryption of digital signatures and applications
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make use of a trusted third party (TTP) but in an optimistic sense, that is, the TTP takes part in the protocol only if one user cheats or simply...
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
Albert Levi, M. Ufuk Caglayan, Cetin K. Koc
Certification is a common mechanism for authentic public key distribution. In order to obtain a public key, verifiers need to extract a certificate path from a network of certificates, which is called public key infrastructure (PKI), and verify the...
Tree-based group key agreement
Yongdae Kim, Adrian Perrig, Gene Tsudik
Secure and reliable group communication is an active area of research. Its popularity is fueled by the growing importance of group-oriented and collaborative applications. The central research challenge is secure and efficient group key management....
Crypto-based identifiers (CBIDs): Concepts and applications
Gabriel Montenegro, Claude Castelluccia
This paper addresses the identifier ownership problem. It does so by using characteristics of Statistical Uniqueness and Cryptographic Verifiability (SUCV) of certain entities which this document calls SUCV Identifiers and Addresses, or,...
The UCONABC usage control model
Jaehong Park, Ravi Sandhu
In this paper, we introduce the family of UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models because they address the essence of UCON, leaving...