ded abstract of this paper was published in the proceedings of PKC 2010. Automata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗ Carmit Haza...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared to the standardized genus 1 curves, or elliptic curves, arithmetic on genus 2 ...
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary ...
In the random oracle model, parties are given oracle access to a random function (i.e., a uniformly chosen function from the set of all functions), and are assumed to have unbound...