Sciweavers

106 search results - page 6 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
ASIACRYPT
2006
Springer
13 years 11 months ago
New Approach for Selectively Convertible Undeniable Signature Schemes
In this paper, we propose a new approach for constructing selectively convertible undeniable signature schemes, and present two efficient schemes based on RSA. Our approach allows ...
Kaoru Kurosawa, Tsuyoshi Takagi
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
TKDE
1998
102views more  TKDE 1998»
13 years 7 months ago
Database Migration: A New Architecture for Transaction Processing in Broadband Networks
—Due to recent developments in network technologies, broader channel bandwidth is becoming prevalent in worldwide networks. As one of the new technologies making good use of such...
Takahiro Hara, Kaname Harumoto, Masahiko Tsukamoto...
SEUS
2008
IEEE
14 years 2 months ago
M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks
In this paper we investigate a practical routing solution for a new class of wireless sensor networks where any node can be mobile anytime. Assuming GPS-enabled sensor nodes we pro...
Lynn Choi, Jae Kyun Jung, Byong-Ha Cho, Hyohyun Ch...