Sciweavers

CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
14 years 2 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
14 years 2 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
14 years 2 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
CRYPTO
2008
Springer
83views Cryptology» more  CRYPTO 2008»
14 years 2 months ago
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas...
CRYPTO
2008
Springer
85views Cryptology» more  CRYPTO 2008»
14 years 2 months ago
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
Yevgeniy Dodis, Victor Shoup, Shabsi Walfish