Sciweavers

87 search results - page 10 / 18
» A Verifiable Random Function with Short Proofs and Keys
Sort
View
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 3 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
93
Voted
ENTCS
2006
122views more  ENTCS 2006»
14 years 9 months ago
Verification of Clock Synchronization Algorithms: Experiments on a Combination of Deductive Tools
We report on an experiment in combining Isabelle with automatic first-order arithmetic provers to increase automation on the verification of distributed protocols. As a case study...
Damián Barsotti, Leonor Prensa Nieto, Alwen...
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 2 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
72
Voted
ENTCS
2006
103views more  ENTCS 2006»
14 years 9 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
CORR
2010
Springer
129views Education» more  CORR 2010»
14 years 9 months ago
Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error
Consider the minimum mean-square error (MMSE) of estimating an arbitrary random variable from its observation contaminated by Gaussian noise. The MMSE can be regarded as a function...
Dongning Guo, Yihong Wu, Shlomo Shamai, Sergio Ver...