Sciweavers

38 search results - page 4 / 8
» crypto 2003
Sort
View
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
CRYPTO
2004
Springer
205views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model
In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, intro...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
On Deniability in the Common Reference String and Random Oracle Model
We revisit the definitions of zero-knowledge in the Common Reference String (CRS) model and the Random Oracle (RO) model. We argue that even though these definitions syntacticall...
Rafael Pass