Sciweavers

8972 search results - page 19 / 1795
» Private Information Retrieval
Sort
View
78
Voted
AI
2005
Springer
14 years 10 months ago
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama
ICTAC
2009
Springer
15 years 5 months ago
The Secret Art of Computer Programming
“Classical” program development by refinement [12, 2, 3] is a technique for ensuring that source-level program code remains faithful to the semantic goals set out in its corre...
Annabelle McIver
ASIACRYPT
2000
Springer
15 years 3 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 5 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
CCS
2008
ACM
14 years 11 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar