Sciweavers

86 search results - page 6 / 18
» Impossibility Results for Secret Establishment
Sort
View
RIVF
2007
13 years 9 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
GLOBECOM
2008
IEEE
14 years 2 months ago
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation...
Xiang He, Aylin Yener
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
14 years 2 months ago
Better with Byzantine: Manipulation-Optimal Mechanisms
Abstract. A mechanism is manipulable if it is in some agents’ best interest to misrepresent their private information. The revelation principle establishes that, roughly, anythin...
Abraham Othman, Tuomas Sandholm
EUROCRYPT
2001
Springer
14 years 8 days ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 6 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...