Sciweavers

1562 search results - page 96 / 313
» Mathematics, Cryptology, Security
Sort
View
ASIACRYPT
2004
Springer
14 years 1 months ago
Practical Two-Party Computation Based on the Conditional Gate
Abstract. We present new results in the framework of secure multiparty computation based on homomorphic threshold cryptosystems. We introduce the conditional gate as a special type...
Berry Schoenmakers, Pim Tuyls
CTRSA
2010
Springer
211views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
Léo Ducas
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
14 years 21 days ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
EUROCRYPT
2001
Springer
14 years 21 days ago
How to Convert the Flavor of a Quantum Bit Commitment
In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealin...
Claude Crépeau, Frédéric L&ea...
EUROCRYPT
2001
Springer
14 years 21 days ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski