Sciweavers

64 search results - page 4 / 13
» crypto 2006
Sort
View
CRYPTO
2006
Springer
232views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
Abstract. We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme...
Hao Chen, Ronald Cramer
CRYPTO
2006
Springer
109views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
There are several candidate semantically secure encryption schemes, yet in many applications non-malleability of encryptions is crucial. We show how to transform any semantically s...
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
CRYPTO
2006
Springer
99views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Scalable Secure Multiparty Computation
We present the first general protocol for secure multiparty computation which is scalable, in the sense that the amortized work per player does not grow, and in some natural settin...
Ivan Damgård, Yuval Ishai
CSREASAM
2006
13 years 7 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
IJNSEC
2007
143views more  IJNSEC 2007»
13 years 6 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin