Sciweavers

403 search results - page 31 / 81
» An algebra for commitment protocols
Sort
View
CSI
2008
82views more  CSI 2008»
14 years 11 months ago
Efficient and secure protocol in fair document exchange
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a va...
Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qi...
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
16 years 11 days ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 6 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
DSOM
2004
Springer
15 years 5 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...