Sciweavers

100 search results - page 19 / 20
» Alice and Bob
Sort
View
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
13 years 11 months ago
Securely Obfuscating Re-encryption
Abstract. We present the first positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...
STOC
2004
ACM
152views Algorithms» more  STOC 2004»
14 years 5 months ago
Exponential separation of quantum and classical one-way communication complexity
Abstract. We give the first exponential separation between quantum and bounded-error randomized one-way communication complexity. Specifically, we define the Hidden Matching Proble...
Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis
INFOCOM
2010
IEEE
13 years 3 months ago
P2P Trading in Social Networks: The Value of Staying Connected
—The success of future P2P applications ultimately depends on whether users will contribute their bandwidth, CPU and storage resources to a larger community. In this paper, we pr...
Zhengye Liu, Hao Hu, Yong Liu, Keith W. Ross, Yao ...
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 5 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
COCO
2009
Springer
131views Algorithms» more  COCO 2009»
13 years 12 months ago
A Multi-Round Communication Lower Bound for Gap Hamming and Some Consequences
—The Gap-Hamming-Distance problem arose in the context of proving space lower bounds for a number of key problems in the data stream model. In this problem, Alice and Bob have to...
Joshua Brody, Amit Chakrabarti