Sciweavers

18 search results - page 4 / 4
» Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivio...
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 7 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
INFOCOM
2005
IEEE
14 years 8 hour ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
13 years 7 months ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao