Results 31 to 40 of about 23,331 (249)

A device-independent protocol for XOR oblivious transfer [PDF]

open access: yesQuantum, 2022
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them. Ideally, Alice should not learn Bob's desired function choice and Bob should not learn any more than what is logically implied by the ...
Srijita Kundu   +2 more
doaj   +1 more source

A Security-aware Approach to JXTA-Overlay Primitives [PDF]

open access: yes, 2009
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications.
Arnedo Moreno, Joan   +3 more
core   +3 more sources

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

open access: yesSensors, 2022
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang   +7 more
doaj   +1 more source

Quantum advantage for probabilistic one-time programs

open access: yesNature Communications, 2018
Information Theoretically-secure deterministic programs that self-destruct after a single use are known to be impossible to implement. Here, the authors use quantum states to implement a probabilistic version of this fundamental cryptographic primitive ...
Marie-Christine Roehsner   +4 more
doaj   +1 more source

Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]

open access: yes, 2014
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne   +2 more
core   +1 more source

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

Compiling symbolic attacks to protocol implementation tests

open access: yes, 2012
Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the ...
Ghabri, Hatem   +2 more
core   +4 more sources

Pseudo-free families and cryptographic primitives

open access: yesJournal of Mathematical Cryptology, 2022
Abstract In this article, we study the connections between pseudo-free families of computational Ω \Omega
openaire   +3 more sources

The Eleventh Power Residue Symbol

open access: yesJournal of Mathematical Cryptology, 2020
This paper presents an efficient algorithm for computing 11th-power residue symbols in the cyclo-tomic field ℚ(ζ11),$ \mathbb{Q}\left( {{\zeta }_{11}} \right), $where 11 is a primitive 11th root of unity.
Joye Marc   +3 more
doaj   +1 more source

Permutable Cut-and-Choose Oblivious Transfer and Its Application

open access: yesIEEE Access, 2020
Oblivious transfer (OT) is a significant primitive with wide use in secure two-party computation, private set intersection private and other cryptographic schemes.
Xiaochao Wei   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy