Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
1. Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model

Nasrollah Pakniat; Ziba Eslami

Volume 4, Issue 1 , Winter and Spring 2017, , Pages 3-12

http://dx.doi.org/10.22108/jcs.2018.108395.

Abstract
  Social secret sharing, introduced in 2010 by Nojoumian et al., allows to share a secret among a set of participants whose authorities can vary over time. However, existing social secret ...  Read More
A CCA2-Secure Incomparable Public Key Encryption Scheme
2. A CCA2-Secure Incomparable Public Key Encryption Scheme

Bahman Rajabi; Ziba Eslami

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 3-12

Abstract
  In 2003, Waters, Felten and Sahai introduced a novel cryptographic primitive called Incomparable Public Key cryptosystem to protect anonymity of message receivers in an untrusted network. ...  Read More