Sciweavers

403 search results - page 55 / 81
» An algebra for commitment protocols
Sort
View
ICFP
2008
ACM
15 years 11 months ago
The power of Pi
This paper exhibits the power of programming with dependent types by dint of embedding three domain-specific languages: Cryptol, a language for cryptographic protocols; a small da...
Nicolas Oury, Wouter Swierstra
FOCS
2006
IEEE
15 years 6 months ago
Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for LOGSNP
Let Λ : {0, 1}n ×{0, 1}m → {0, 1} be a Boolean formula of size d, or more generally, an arithmetic circuit of degree d, known to both Alice and Bob, and let y ∈ {0, 1}m be a...
Yael Tauman Kalai, Ran Raz
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 5 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
RULES
1993
Springer
133views Database» more  RULES 1993»
15 years 4 months ago
Activities in Object Bases
Objects are collected into an object base because of a presumed need for cooperation among them. In classical object bases the cooperation is based on synchronous, preplanned mess...
Peter C. Lockemann, Hans-Dirk Walter
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
16 years 5 days ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous