Sciweavers

597 search results - page 5 / 120
» Homomorphisms of random paths
Sort
View
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 1 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
INFOCOM
2009
IEEE
15 years 4 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
RANDOM
1997
Springer
15 years 1 months ago
Average-Case Complexity of Shortest-Paths Problems in the Vertex-Potential Model
Colin Cooper, Alan M. Frieze, Kurt Mehlhorn, Volke...
RANDOM
1998
Springer
15 years 1 months ago
Disjoint Paths in Expander Graphs via Random Walks: A Short Survey
There has been a significant amount of research lately on solving the edge disjoint path and related problems on expander graphs. We review the random walk approach of Broder, Fri...
Alan M. Frieze