In a (t,n) group-oriented cryptosystem, collaboration of at least t participants is required to perform the group transformation. Two important issues in implementation of a such cryptosystems are: 1. the sender needs to collect authenticated public keys of the intended receivers; 2. the combiner needs a secure channel to collect (privately) the partial results from collaborating participants. This paper discusses the above problems and proposes a (t,n) group-oriented cryptosystem that works with self-certified public keys, with no help of any combiner.SCOPUS: cp.kinfo:eu-repo/semantics/published4th Australasian Conference on Information Security and Privacy, ACISP 1999; Wollongong; Australia; 7 April 1999 through 9 April 1999; Code 14902
Computer networks bring tremendous progress to the information-based society. Com- panies, organizat...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a (t; n) group-oriented cryptosystem, collaboration of at least t participants is required to per...
In a (t; n) group-oriented cryptosystem, collaboration of at least t participants is required to per...
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perf...
[[abstract]]In 2001, Ghodosi and Saeednia proposed a self-certified group-oriented cryptosystem with...
A modified protocol which prevents the conspiracy attack developed by Susilo and Safavi-Naini on a s...
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perf...
[[abstract]]A group signature is a digital signature that allows a group member to sign messages ano...
Introduces some of the commonly known methods (protocols) used in key sharing/distribution problems,...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
A group encryption scheme allows anyone to form a ciphertext for a given group member while keeping ...
Abstract. A group encryption scheme allows anyone to form a ciphertext for a given group member whil...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
Computer networks bring tremendous progress to the information-based society. Com- panies, organizat...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a (t; n) group-oriented cryptosystem, collaboration of at least t participants is required to per...
In a (t; n) group-oriented cryptosystem, collaboration of at least t participants is required to per...
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perf...
[[abstract]]In 2001, Ghodosi and Saeednia proposed a self-certified group-oriented cryptosystem with...
A modified protocol which prevents the conspiracy attack developed by Susilo and Safavi-Naini on a s...
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perf...
[[abstract]]A group signature is a digital signature that allows a group member to sign messages ano...
Introduces some of the commonly known methods (protocols) used in key sharing/distribution problems,...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
A group encryption scheme allows anyone to form a ciphertext for a given group member while keeping ...
Abstract. A group encryption scheme allows anyone to form a ciphertext for a given group member whil...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
Computer networks bring tremendous progress to the information-based society. Com- panies, organizat...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...