Sciweavers

FC
2010
Springer
177views Cryptology» more  FC 2010»
14 years 15 days ago
Signatures of Reputation
John Bethencourt, Elaine Shi, Dawn Song
FC
2010
Springer
188views Cryptology» more  FC 2010»
14 years 15 days ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
FC
2010
Springer
230views Cryptology» more  FC 2010»
14 years 15 days ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
FC
2010
Springer
160views Cryptology» more  FC 2010»
14 years 15 days ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
FC
2010
Springer
205views Cryptology» more  FC 2010»
14 years 15 days ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
14 years 16 days ago
The Round Complexity of Verifiable Secret Sharing Revisited
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS c...
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pand...
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
14 years 16 days ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 16 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CTRSA
2007
Springer
102views Cryptology» more  CTRSA 2007»
14 years 16 days ago
Improved Efficiency for Private Stable Matching
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage). We show that the communication complexity...
Matthew K. Franklin, Mark Gondree, Payman Mohassel