Sciweavers

Share
3 search results - page 1 / 1
» A Two-Party Protocol with Trusted Initializer for Computing ...
Sort
View
WISA
2010
Springer
10 years 11 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
CSIE
2009
IEEE
11 years 8 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
11 years 2 months ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe
books