Sciweavers

127
Voted
FC
2006
Springer
145views Cryptology» more  FC 2006»
15 years 7 months ago
Efficient Correlated Action Selection
Abstract. Participants in e-commerce and other forms of online collaborations tend to be selfish and rational, and therefore game theory has been recognized as particularly relevan...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
FC
2006
Springer
109views Cryptology» more  FC 2006»
15 years 7 months ago
A Private Stable Matching Algorithm
Existing stable matching algorithms reveal the preferences of all participants, as well as the history of matches made and broken in the course of computing a stable match. This in...
Philippe Golle
FC
2006
Springer
153views Cryptology» more  FC 2006»
15 years 7 months ago
Revisiting Oblivious Signature-Based Envelopes
Secure, anonymous and unobservable communication is becoming increasingly important due to the gradual erosion of privacy in many aspects of everyday life. This prompts the need f...
Samad Nasserian, Gene Tsudik
128
Voted
FC
2006
Springer
107views Cryptology» more  FC 2006»
15 years 7 months ago
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones
Gwenaëlle Martinet, Guillaume Poupard, Philip...
FC
2006
Springer
139views Cryptology» more  FC 2006»
15 years 7 months ago
Defeating Malicious Servers in a Blind Signatures Based Voting System
In this paper, we present two failures in the blind signatures based voting system Votopia [2] which has been tested during the last World Soccer Cup. We then propose a fix which r...
Sébastien Canard, Matthieu Gaud, Jacques Tr...