Commitment scheme

Results: 216



#Item
31Oblivious transfer / Secure multi-party computation / Information-theoretic security / Secret sharing / Distributed computing / Indocrypt / Commitment scheme / Asynchronous system / Cryptography / Cryptographic protocols / Verifiable secret sharing

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
32Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
33Physics / Quantum computer / Quantum circuit / Density matrix / Quantum channel / Commitment scheme / BB84 / Qubit / Quantum key distribution / Theoretical computer science / Quantum information science / Quantum mechanics

BRICS RSBRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-10-07 08:32:59
34Group signature / IP / NP / Commitment scheme / Soundness / BRIC / Alice and Bob / Cryptography / Cryptographic protocols / Zero-knowledge proof

BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-04-06 04:06:17
35Public-key cryptography / Secure channel / Commitment / Universal composability / Cryptography / Cryptographic protocols / Commitment scheme

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: Universally Composable Commitments with Constant Expansion Factor Perfect Hiding and Perfect Binding

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 08:55:18
36Cryptography / Commitment scheme / Channel / Data / Noisy-channel coding theorem / Transmission Control Protocol / Information theory / Telecommunications engineering / Information

Unfair Noisy Channels and Oblivious Transfer Ivan Damg˚ ard1 , Serge Fehr2? , Kirill Morozov1, and Louis Salvail1?? BRICS? ? ? , FICS † , Aarhus University, Denmark {ivan,kirill,salvail}@brics.dk ACAC‡ , Department

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2003-12-16 03:09:30
37Transmission Control Protocol / NP / Commitment scheme / Large cardinals / Mathematics / Cryptography / Applied mathematics / IP

An extended abstract of this paper is published in the proceedings of the 40th International Colloquium on Automata, Languages and Programming—ICALPThis is the full version. Outsourced Pattern Matching Sebastian

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-06-18 07:33:20
38Pat Sheehan

Volunteer Awards Scheme To acknowledge the strong commitment and invaluable support of FLAC volunteers who provide legal advice through our network of FLAC centres, we introduced an awards scheme in 2012 to recognise tho

Add to Reading List

Source URL: www.flac.ie

Language: English - Date: 2014-11-21 10:18:31
    39Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

    An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-02-21 12:47:44
    40Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

    How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2014-09-01 09:06:37
    UPDATE