Sciweavers

121 search results - page 3 / 25
» Oblivious transfer with access control
Sort
View
WINET
2002
99views more  WINET 2002»
13 years 7 months ago
Medium Access Control for ATM-to-CDMA Interface
An integrated medium access control framework for a direct sequence code-division multiple access (CDMA) radio access to an asynchronous transfer mode (ATM) network is considered. ...
Aykut Hocanin, Shanuj V. Sarin, Hakan Deliç
CCS
2011
ACM
12 years 7 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ESORICS
2006
Springer
13 years 11 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
13 years 11 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
PODC
2003
ACM
14 years 23 days ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh