Sciweavers

48 search results - page 4 / 10
» Computing Inverses over a Shared Secret Modulus
Sort
View
IJISEC
2002
58views more  IJISEC 2002»
15 years 4 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
166
Voted
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
182
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
NIPS
2008
15 years 6 months ago
Multi-task Gaussian Process Learning of Robot Inverse Dynamics
The inverse dynamics problem for a robotic manipulator is to compute the torques needed at the joints to drive it along a given trajectory; it is beneficial to be able to learn th...
Kian Ming Adam Chai, Christopher K. I. Williams, S...
PAISI
2010
Springer
15 years 3 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...