Analysis and Design for Private Message Board Systems (Applications) (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
When two parties connect via a possibly unreliable network, ensuring fairness becomes a serious problem. To solve this problem, a lot of Certified E-mail systems are proposed. However, user's privacy including confidentiality and anonymity is not considered in almost all of these systems. In this paper, we propose two private message board systems using an electronic notice board to solve Certified mail problem.
- 社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
Sakurai K
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Imamoto Kenji
Department Of Computer Science And Communication Engineering Graduate School Of Information Science
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere