Sciweavers

317 search results - page 19 / 64
» Who gives a tweet
Sort
View
EUROCRYPT
2004
Springer
14 years 2 months ago
Public Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An ema...
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky...
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
14 years 18 days ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
CCS
2010
ACM
13 years 9 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
IJCSS
2007
97views more  IJCSS 2007»
13 years 8 months ago
Collaborative Multi-Agent-based e-Commerce Framework
Software agents offer a promise to change electronic commerce trading by helping traders to purchase products based on their interests and preferences. E-commerce systems are incr...
Tarek Helmy
DAGSTUHL
2006
13 years 10 months ago
Using Quantum Oblivious Transfer to Cheat Sensitive Quantum Bit Commitment
It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independent...
Andreas Jakoby, Maciej Liskiewicz, Aleksander Madr...