Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ernest F. Brickell is active.

Publication


Featured researches published by Ernest F. Brickell.


public key cryptography | 2000

Design Validations for Discrete Logarithm Based Signature Schemes

Ernest F. Brickell; David Pointcheval; Serge Vaudenay; Moti Yung

A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while trying to minimize the use of ideal hash functions. We consider several Discrete Logarithm (DSA-like) signatures abstracted as generic schemes. We show that the following holds: “if the schemes can be broken by an existential forgery using an adaptively chosen-message attack then either the discrete logarithm problem can be solved, or some hash function can be distinguished from an ideal one, or multi-collisions can be found.” Thus, for these signature schemes, either they are equivalent to the discrete logarithm problem or there is an attack that takes advantage of properties which are not desired (or expected) in strong practical hash functions (SHA-1 or whichever high quality cryptographic hash function is used). What is interesting is that the schemes we discuss include KCDSA and slight variations of DSA.


australasian conference on information security and privacy | 2000

Sharing Block Ciphers

Ernest F. Brickell; Giovanni Di Crescenzo; Yair Frankel

Threshold cryptosystems use algebraic properties such as homomorphisms in order to allow several parties to jointly evaluate a cryptographic primitive. Several cryptographic primitives, however, avoid -by definition- the use of algebraic properties, or otherwise their security is compromised; this is the case, for instance, of block ciphers, pseudo-random functions, and pseudo-random permutations. Is it then impossible to construct a threshold cryptosystem in order to share the computation of a block cipher ?


computer and communications security | 2004

Direct anonymous attestation

Ernest F. Brickell; Jan Camenisch; Liqun Chen


Archive | 2000

Method for securely using a single password for multiple purposes

Keen W. Chan; Ernest F. Brickell


Archive | 2010

Method and apparatus for key provisioning of hardware devices

Ernest F. Brickell; Shay Gueron; Jiangtao Li; Carlos V. Rozas; Daniel Nemiroff; Vincent R. Scarlata; Uday Savagaonkar; Simon Johnson


Archive | 2007

Apparatus and method for enhanced revocation of direct proof and direct anonymous attestation

Ernest F. Brickell; Jiangtao Li


Archive | 2007

Apparatus and method for direct anonymous attestation from bilinear maps

Ernest F. Brickell; Jiangtao Li


Archive | 2004

Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information

Ernest F. Brickell


Archive | 2005

Apparatus and method for proving the denial of a direct proof signature

Ernest F. Brickell


Archive | 2008

Storage minimization technique for direct anonymous attestation keys

Ernest F. Brickell; Jiangtao Li

Collaboration


Dive into the Ernest F. Brickell's collaboration.

Researchain Logo
Decentralizing Knowledge