Sciweavers

954 search results - page 183 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
FC
2004
Springer
89views Cryptology» more  FC 2004»
14 years 4 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
EUROCRYPT
2003
Springer
14 years 4 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the ā€œdualityā€ of the two primitives was noted as early as Diļ¬ƒe-He...
Aggelos Kiayias, Moti Yung
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 3 months ago
On the Round Complexity of Covert Computation
In STOCā€™05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
EUROCRYPT
2010
Springer
14 years 3 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
SDMW
2009
Springer
14 years 3 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A ā€œfriend ļ¬nderā€ is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni