Sciweavers

Share
2 search results - page 1 / 1
» Converting Group Key Agreement Protocol into Password-Based ...
Sort
View
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
9 years 1 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
ICDCS
2009
IEEE
9 years 7 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
books