Sciweavers

32 search results - page 1 / 7
» On the efficiency of checking perfect privacy
Sort
View
PODS
2006
ACM
121views Database» more  PODS 2006»
14 years 5 months ago
On the efficiency of checking perfect privacy
Privacy-preserving query-answering systems answer queries while provably guaranteeing that sensitive information is kept secret. One very attractive notion of privacy is perfect p...
Ashwin Machanavajjhala, Johannes Gehrke
FC
2004
Springer
94views Cryptology» more  FC 2004»
13 years 8 months ago
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy...
Jens Groth
CCS
2010
ACM
13 years 8 months ago
PAriCheck: an efficient pointer arithmetic checker for C programs
Yves Younan, Pieter Philippaerts, Lorenzo Cavallar...
ESORICS
2005
Springer
13 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan