Sciweavers

CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
13 years 8 months ago
The Round Complexity of Verifiable Secret Sharing Revisited
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS c...
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pand...
CRYPTO
2009
Springer
127views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
CRYPTO
2009
Springer
131views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
The well-studied task of learning a linear function with errors is a seemingly hard problem and the basis for several cryptographic schemes. Here we demonstrate additional applicat...
Benny Applebaum, David Cash, Chris Peikert, Amit S...
CRYPTO
2009
Springer
104views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Position Based Cryptography
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Raf...
CRYPTO
2009
Springer
156views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
How to Hash into Elliptic Curves
Thomas Icart
CRYPTO
2009
Springer
91views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Message Authentication Codes from Unpredictable Block Ciphers
Yevgeniy Dodis, John P. Steinberger
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
CRYPTO
2009
Springer
89views Cryptology» more  CRYPTO 2009»
13 years 10 months ago
Linear Algebra with Sub-linear Zero-Knowledge Arguments
We suggest practical sub-linear size zero-knowledge arguments for statements involving linear algebra. Given commitments to matrices over a finite field, we give a sub-linear siz...
Jens Groth