Sciweavers

113 search results - page 22 / 23
» Threshold Fully Homomorphic Encryption and Secure Computatio...
Sort
View
CCS
2006
ACM
13 years 10 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
ASIACRYPT
2000
Springer
13 years 10 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
SUTC
2010
IEEE
13 years 4 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
IFIP
2009
Springer
13 years 4 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti