Sciweavers

15 search results - page 3 / 3
» Modeling exceptions via commitment protocols
Sort
View
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
14 years 5 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
RULES
1993
Springer
133views Database» more  RULES 1993»
13 years 9 months ago
Activities in Object Bases
Objects are collected into an object base because of a presumed need for cooperation among them. In classical object bases the cooperation is based on synchronous, preplanned mess...
Peter C. Lockemann, Hans-Dirk Walter
ATAL
2007
Springer
13 years 11 months ago
An event-driven approach for agent-based business process enactment
Agents enacting business processes in large open environments need to adaptively accommodate exceptions. Work on multiagent approaches can flexibly model business processes. This...
Payal Chakravarty, Munindar P. Singh
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 5 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...