plus/minus epsilon
Page 5A Criticism of JavaScript Cryptography
17 Jun 2014To be pedantic, perhaps a better name for this post would be "A Criticism of In-Browser Cryptography," because it's really the "In-Browser" part that gets people--JavaScript is just another programming language.
One-Time Attribute-Based Signatures
30 May 2014A One-Time Attribute-Based Signature scheme allows a signer, who posses a set of attributes verified by an authority, to sign a message with a predicate that is satisfied by his attributes. The signature can reveal no more about the signer than the predicate requires, and it should be infeasible to link multiple signatures to the same signer (signatures should be anonymous). Multiple users, each with only a strict subset of the required attributes to satisfy a predicate, should not be able to collude and forge a signature that does satisfy the predicate (the scheme should be collusion-resistant).
Optimizing SEAD for Secure Distributed Hash Tables
16 Apr 2014SEAD, the Secure Efficient Ad hoc Distance vector routing protocol, is a recent secure ad-hoc routing protocol designed to use symmetric cryptographic primitives almost exclusively. Relying on symmetric cryptography, rather than asymmetric often requires 3 to 4 orders of magnitude less computation with a negligible increase in storage or network overhead.
A Generalization of Secure Distributed Hash Tables
27 Mar 2014Peer-to-peer distributed hash tables have been the subject of a large amount of research because they solve a significant problem in computer science: the secure and efficient distribution of large amounts of data amongst a loose collection of disparate nodes, lacking any centralized authorities or hierarchies.