Sciweavers

CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
CRYPTO
2008
Springer
83views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas...
CRYPTO
2008
Springer
85views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
Yevgeniy Dodis, Victor Shoup, Shabsi Walfish
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
14 years 1 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
14 years 1 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
14 years 1 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
ASIACRYPT
2008
Springer
14 years 1 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas