Sciweavers

42 search results - page 1 / 9
» Cheating in Visual Cryptography
Sort
View
DCC
2006
IEEE
14 years 4 months ago
Cheating in Visual Cryptography
Gwoboa Horng, Tzungher Chen, Du-shiau Tsai
PKC
2004
Springer
102views Cryptology» more  PKC 2004»
13 years 10 months ago
Cryptographic Randomized Response Techniques
Abstract. We develop cryptographically secure techniques to guarantee unconditional privacy for respondents to polls. Our constructions are efficient and practical, and are shown ...
Andris Ambainis, Markus Jakobsson, Helger Lipmaa
FSTTCS
2010
Springer
13 years 2 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
FOCS
2009
IEEE
13 years 8 months ago
Optimal Quantum Strong Coin Flipping
Coin flipping is a fundamental cryptographic primitive that enables two distrustful and far apart parties to create a uniformly random bit [Blu81]. Quantum information allows for ...
André Chailloux, Iordanis Kerenidis
TCC
2010
Springer
236views Cryptology» more  TCC 2010»
14 years 1 months ago
From Passive to Covert Security at Low Cost
Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in man...
Ivan Damgård, Martin Geisler, Jesper Buus Ni...