Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Abdalla, Michel Add to Alert Profile  
Date Reviewed  
  1 - 2 of 2 reviews    
  Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016.  Type: Article

The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....
Sep 7 2016  
  Key management for restricted multicast using broadcast encryption
Abdalla M., Shavitt Y., Wool A. IEEE/ACM Transactions on Networking 8(4): 443-454, 2000.  Type: Article

Pay-per-view is one of several applications that require efficient key management in the context of encrypting broadcast transmissions in order to implement selectively restricted multicast operations sent over an insecure channel. Sin...
Feb 1 2001  

Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy