Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
FC
2004
Springer
94views Cryptology» more  FC 2004»
10 years 5 months ago
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy...
Jens Groth
FC
2004
Springer
81views Cryptology» more  FC 2004»
10 years 6 months ago
Cryptography and the French Banking Cards: Past, Present, Future
Abstract. This is a brief summary of the invited lecture delivered during the conference. The interested reader is referred to [2] for more information.
Jacques Stern
FC
2004
Springer
75views Cryptology» more  FC 2004»
10 years 6 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
FC
2004
Springer
80views Cryptology» more  FC 2004»
10 years 6 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
FC
2004
Springer
105views Cryptology» more  FC 2004»
10 years 6 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
FC
2004
Springer
78views Cryptology» more  FC 2004»
10 years 6 months ago
Timing Attacks in Low-Latency Mix Systems (Extended Abstract)
Brian Neil Levine, Michael K. Reiter, Chenxi Wang,...
FC
2004
Springer
78views Cryptology» more  FC 2004»
10 years 6 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
FC
2004
Springer
89views Cryptology» more  FC 2004»
10 years 6 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost e...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
FC
2004
Springer
129views Cryptology» more  FC 2004»
10 years 6 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
books