Error-Tolerant E-Discovery Protocols
Abstract
Supplementary Material
References
Index Terms
- Error-Tolerant E-Discovery Protocols
Recommendations
Formal Analysis Of Multi-party Non-repudiation Protocols Without TTP
ICCIIS '10: Proceedings of the 2010 International Conference on Communications and Intelligence Information SecurityNon-repudiation service is crucial to electronic commerce. Now multi-party non-repudiation is a new focus of research. This paper presents a multi-party non-repudiation protocol, based on a group encryption scheme. A multi-party non-repudiation problem ...
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party
DEXA '99: Proceedings of the 10th International Workshop on Database & Expert Systems ApplicationsRecently developed cryptographic techniques [2, 4, 6, 14] make it possible to construct fair exchange protocols with an off-line trusted third party(TTP). The technique is referred to as a verifiable encryption scheme(VES) proves that a ciphertext is ...
Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
INDOCRYPT'06: Proceedings of the 7th international conference on Cryptology in IndiaThree-party password-based authenticated key exchange (3-party PAKE) protocols make two communication parties establish a shared session key with the help of a trusted server, with which each of the two parties shares a predetermined password. Recently, ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 152Total Downloads
- Downloads (Last 12 months)152
- Downloads (Last 6 weeks)35
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in