[[abstract]]The Diffie-Hellman (DH) problem is an important security assumption in modern cryptography. In this paper, a new type of cryptographic technique called a convinced Diffie-Hellman (DH) computation scheme is proposed. In the convinced DH computation scheme, an issuer can convince a verifier that the computation of the Diffie-Hellman problem is correct under without revealing any exponential parts of two Diffie-Hellman public values. Firstly, the formal framework and security requirements for this new cryptographic scheme are defined. Then a concrete scheme is proposed. In the random oracle model and under the difficulty of computing discrete logarithm, we demonstrate that the proposed scheme meets the defined security requirements...
Abstract — Since the publication of Diffie-Hellman algorithm for two-party key exchange in 1976, the...
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely use...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...
The Diffie-Hellman (DH) problem is a problem that is assumed to be difficult to do, hence the securi...
The Diffie-Hellman (DH) problem is a problem that is assumed to be difficult to do, hence the securi...
This paper describes a Diffie-Hellman based encryption scheme, DHIES (formerly named DHES and DHAES...
The Decision Diffie-Hellman assumption (ddh) is a gold mine. It enables one to construct ecffiient c...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
Abstract. Recently, it has been proved that computational security can be automatically verified usi...
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
In this paper they study generalizations of the Diffie-Hellman problems recently used to construct c...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely use...
Abstract — Since the publication of Diffie-Hellman algorithm for two-party key exchange in 1976, the...
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely use...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...
The Diffie-Hellman (DH) problem is a problem that is assumed to be difficult to do, hence the securi...
The Diffie-Hellman (DH) problem is a problem that is assumed to be difficult to do, hence the securi...
This paper describes a Diffie-Hellman based encryption scheme, DHIES (formerly named DHES and DHAES...
The Decision Diffie-Hellman assumption (ddh) is a gold mine. It enables one to construct ecffiient c...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
Abstract. Recently, it has been proved that computational security can be automatically verified usi...
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
In this paper they study generalizations of the Diffie-Hellman problems recently used to construct c...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely use...
Abstract — Since the publication of Diffie-Hellman algorithm for two-party key exchange in 1976, the...
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely use...
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the har...