Sciweavers

41 search results - page 3 / 9
» asiacrypt 2010
Sort
View
ASIACRYPT
2010
Springer
13 years 3 months ago
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
ASIACRYPT
2010
Springer
13 years 3 months ago
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Bit-decomposition, which is proposed by Damg
Chao Ning, Qiuliang Xu
ASIACRYPT
2010
Springer
13 years 3 months ago
Generic Compilers for Authenticated Key Exchange
So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important applicatio...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
ASIACRYPT
2010
Springer
13 years 3 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
ASIACRYPT
2010
Springer
13 years 3 months ago
Short Pairing-Based Non-interactive Zero-Knowledge Arguments
We construct non-interactive zero-knowledge arguments for circuit satisfiability with perfect completeness, perfect zero-knowledge and computational soundness. The non-interactive ...
Jens Groth