This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Interoperability is one of the main issues in creating a networked system of repositories. The eduSource project in its holistic approach to building a network of learning object ...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
Co-located collaboration in classroom is the topic we tackle in this paper. In particular we will describe how CoFFEE implements this kind of collaboration. CoFFEE is an extensible...
Furio Belgiorno, Rosario De Chiara, Ilaria Manno, ...