Sciweavers

1064 search results - page 113 / 213
» Cryptography from Anonymity
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
EUROCRYPT
1999
Springer
15 years 8 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
CC
2007
Springer
121views System Software» more  CC 2007»
15 years 4 months ago
If NP Languages are Hard on the Worst-Case, Then it is Easy to Find Their Hard Instances
We prove that if NP ⊆ BPP, i.e., if SAT is worst-case hard, then for every probabilistic polynomial-time algorithm trying to decide SAT, there exists some polynomially samplable ...
Dan Gutfreund, Ronen Shaltiel, Amnon Ta-Shma
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 6 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
AVSS
2009
IEEE
15 years 10 months ago
Object-Video Streams for Preserving Privacy in Video Surveillance
—This paper presents a framework for preserving privacy in video surveillance. Raw video is decomposed into a background and one or more object-video streams. Objectvideo streams...
Faisal Z. Qureshi