Index Terms
- Top secret Rosies
Recommendations
ID-based secret-key cryptography
This paper introduces ID-based secret-key cryptography, in which secret keys are privately and uniquely binded to an identity. This enables to extend public-key cryptography features at the high throughput rate of secret-key cryptography. As ...
Secret Public Key Protocols Revisited
Security ProtocolsPassword-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line ...
Delegatable secret handshake scheme
Abstract: Secret handshake, which was introduced by Balfanz et al., is proposed for mutually anonymous authentication among untrusted parties. In this paper, a new secret handshake scheme is designed for supporting delegations. The definitions and ...
Comments