Sciweavers

33 search results - page 7 / 7
» Towards a DL-Based Additively Homomorphic Encryption Scheme
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
VLDB
2004
ACM
147views Database» more  VLDB 2004»
13 years 11 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...
IWSEC
2009
Springer
14 years 2 days ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto