Sciweavers

319 search results - page 16 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
AIL
2004
85views more  AIL 2004»
14 years 9 months ago
Normative autonomy and normative co-ordination: Declarative power, representation, and mandate
In this paper we provide a formal analysis of the idea of normative co-ordination. We argue that this idea is based on the assumption that agents can achieve flexible co-ordination...
Jonathan Gelati, Antonino Rotolo, Giovanni Sartor,...
IPL
2007
111views more  IPL 2007»
14 years 9 months ago
Scalable Bloom Filters
Bloom Filters provide space-efficient storage of sets at the cost of a probability of false positives on membership queries. The size of the filter must be defined a priori bas...
Paulo Sérgio Almeida, Carlos Baquero, Nuno ...
TCC
2009
Springer
124views Cryptology» more  TCC 2009»
15 years 10 months ago
Universally Composable Multiparty Computation with Partially Isolated Parties
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...