Sciweavers

1449 search results - page 41 / 290
» Secure and Efficient Metering
Sort
View
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 9 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
FC
2008
Springer
105views Cryptology» more  FC 2008»
13 years 9 months ago
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Abstract. We consider general secure function evaluation (SFE) of private functions (PF-SFE). Recall, privacy of functions is often most efficiently achieved by general SFE [18,19,...
Vladimir Kolesnikov, Thomas Schneider 0003
CORR
2006
Springer
72views Education» more  CORR 2006»
13 years 7 months ago
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signa...
Christian Hett, Nicolai Kuntze, Andreas U. Schmidt
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SP
2000
IEEE
13 years 11 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob