Sciweavers

49 search results - page 1 / 10
» Anonymity protocols as noisy channels
Sort
View
IANDC
2008
89views more  IANDC 2008»
13 years 4 months ago
Anonymity protocols as noisy channels
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
IEEEARES
2007
IEEE
13 years 11 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
CSFW
2007
IEEE
13 years 11 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JCS
2008
93views more  JCS 2008»
13 years 4 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
MMMACNS
2001
Springer
13 years 9 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov