In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes based on an effective and compact subgroup trace representation cryptosystem to handle with the problem of secure and efficient communication between the server and resource-constrained device. The proposed schemes use the hardness of the Trace-discrete logarithmic like problem. We also show that the deterministic version of the proposed scheme is a one-way trapdoor, and the probabilistic version of the proposed scheme is semantically secure. Moreover, we discuss the efficiency of the proposed schemes by comparing with effective and compact subgroup schemes. Copyright (C) 2015 John Wiley & Sons, Ltd
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
This paper describes and compares a variety of algorithms for secure transmission of information via...
In this paper, we present three new public key broadcast encryption (PKBE) schemes using the receive...
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
This paper introduces the XTR public key system. XTR is based on a new method for representing eleme...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
We solve an open question in code-based cryptography by introducing two provably secure group signat...
Abstract. We solve an open question in code-based cryptography by introducing the first provably sec...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that thi...
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the sub...
[[abstract]]A modified El Gamal scheme is presented which provides both secrecy and signature simult...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
This paper describes and compares a variety of algorithms for secure transmission of information via...
In this paper, we present three new public key broadcast encryption (PKBE) schemes using the receive...
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
This paper introduces the XTR public key system. XTR is based on a new method for representing eleme...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
We solve an open question in code-based cryptography by introducing two provably secure group signat...
Abstract. We solve an open question in code-based cryptography by introducing the first provably sec...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that thi...
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the sub...
[[abstract]]A modified El Gamal scheme is presented which provides both secrecy and signature simult...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
This paper describes and compares a variety of algorithms for secure transmission of information via...
In this paper, we present three new public key broadcast encryption (PKBE) schemes using the receive...