Sciweavers

92 search results - page 9 / 19
» Provable Secure Generalized Signcryption
Sort
View
ICICS
2009
Springer
14 years 2 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
GLOBECOM
2007
IEEE
13 years 9 months ago
Dense Parity Check Based Secrecy Sharing in Wireless Communications
Abstract—It is generally believed harmful to have transmission errors in the wireless communications. The high decoding complexity of dense parity check codes is unfavorable. Thi...
Sheng Xiao, Hossein Pishro-Nik, Weibo Gong
CAI
2007
Springer
13 years 7 months ago
On High-Rate Cryptographic Compression Functions
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
Richard Ostertág, Martin Stanek
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
ASIACRYPT
2004
Springer
14 years 26 days ago
Generic Homomorphic Undeniable Signatures
We introduce a new computational problem related to the interpolation of group homomorphisms which generalizes many famous cryptographic problems including discrete logarithm, Diï¬...
Jean Monnerat, Serge Vaudenay