References of "Theoretical Computer Science"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailSecret, verifiable auctions from elections
Quaglia, Elizabeth A.; Smyth, Benjamin UL

in Theoretical Computer Science (2018), 730

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailEfficient Algorithms for Secure Outsourcing of Bilinear Pairings
Chen, Xiaofeng; Susilo, Willy; Li, Jin et al

in Theoretical Computer Science (2014)

The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing ... [more ▼]

The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, adistinguishing property of our proposed algorithm is that the (resource-constrained) outsourcer is not required to perform any expensive operations, such as point multiplications or exponentiations. Furthermore, we utilize this algorithm as a subroutine to achieve outsource-secure identity-based encryptions and signatures. [less ▲]

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailTracing where and who provenance in Linked Data: A calculus
Dezani-Ciancaglini, Mariangiola; Horne, Ross James UL; Sassone, Vladimiro

in Theoretical Computer Science (2012), 464

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailA Comparison of Semantic Models for Noninterference
van der Meyden, R.; Zhang, Chenyi UL

in Theoretical Computer Science (2010), 411(47), 41234147

The literature on definitions of security based on causality-like notions such as noninterference has used several distinct semantic models for systems. Early work was based on state machine and trace-set ... [more ▼]

The literature on definitions of security based on causality-like notions such as noninterference has used several distinct semantic models for systems. Early work was based on state machine and trace-set definitions; more recent work has dealt with definitions of security in two distinct process algebraic settings. Comparisons between the definitions has been carried out mainly within semantic frameworks. This paper studies the relationship between semantic frameworks, by defining mappings between a number of semantic models and studying the relationship between notions of noninterference under these mappings. [less ▲]

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailInjective Synchronisation: an extension of the authentication hierarchy
Cremers, C. J. F.; Mauw, Sjouke UL; Vink, E. P. De

in Theoretical Computer Science (2006), 367(1-2), 139-161

Detailed reference viewed: 62 (0 UL)