Sciweavers

CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
CRYPTO
2001
Springer
119views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding
Eric Brier, Christophe Clavier, Jean-Sébast...
CRYPTO
2001
Springer
116views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Nonlinear Vector Resilient Functions
An (n, m, k)-resilient function is a function f : Fn 2 → Fm 2 such that every possible output m-tuple is equally likely to occur when the values of k arbitrary inputs are fixed ...
Jung Hee Cheon
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
CRYPTO
2001
Springer
153views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Universally Composable Commitments
d Abstract) Ran Canetti and Marc Fischlin Abstract. We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantee...
Ran Canetti, Marc Fischlin
CRYPTO
2001
Springer
76views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
On the (Im)possibility of Obfuscating Programs
Boaz Barak, Oded Goldreich, Russell Impagliazzo, S...
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
CHES
2001
Springer
124views Cryptology» more  CHES 2001»
14 years 4 months ago
High-Radix Design of a Scalable Modular Multiplier
This paper describes an algorithm and architecture based on an extension of a scalable radix-2 architecture proposed in a previous work. The algorithm is proven to be correct and t...
Alexandre F. Tenca, Georgi Todorov, Çetin K...