Results 261 to 270 of about 2,069,680 (303)
Some of the next articles are maybe not open access.

zkSNARKs in the ROM with Unconditional UC-Security

IACR Cryptology ePrint Archive
Alessandro Chiesa, Giacomo Fenzi
semanticscholar   +2 more sources

Unconditional secure communication: a Russian Cards protocol

Journal of Combinatorial Optimization, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Duan, Zhenhua, Yang, Chen
openaire   +2 more sources

Quantum ANDOS Protocol with Unconditional Security

2006
All-or-Nothing Disclosure of Secrets, or ANDOS for brevity, is an interesting cryptographic task, which involves two parties, say Alice and Bob. Alice has a few secrets, which she regards as equally valuable. She would like to sell any of them to Bob, with the guarantee that no information about the other secrets will be obtained if he pays for only ...
Wei Yang   +3 more
openaire   +1 more source

Anonymous Traceability Schemes with Unconditional Security

2000
In this paper we propose a model for anonymous traceability scheme with unconditional security. The model uses two subsystems: an authentication code with arbiter (A3-code) and an asymmetric traceability with unconditional security. We analyse security of the system against possible attacks and show that security parameters of the system can be ...
Reihaneh Safavi-Naini, Yejing Wang
openaire   +1 more source

Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security

2021
Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction phase. The benefit is that the outside adversary cannot learn the secret even if it is recovered by more than t shareholders.
Min Xiao, Zhe Xia
openaire   +1 more source

Unconditional secure conference key distribution schemes with disenrollment capability

Information Sciences, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo, CRESTI A.
openaire   +3 more sources

Proof of unconditional security of six-state quantum key distribution scheme

Quantum information & computation, 2001
We prove the unconditional security of the standard six-state scheme for quantum key distribution (QKD). We demonstrate its unconditional security up to a bit error rate of 12.7 percents, by allowing only one-way classical communications in the error ...
H. Lo
semanticscholar   +1 more source

Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs

2017
Brzuska et. al. (Crypto 2011) proved that unconditional UC-secure computation is possible if parties have access to honestly generated physically unclonable functions (PUFs). Dachman-Soled et. al. (Crypto 2014) then showed how to obtain unconditional UC secure computation based on malicious PUFs, assuming such PUFs are stateless.
Badrinarayanan, Saikrishna   +3 more
openaire   +3 more sources

Combining MIMO beamforming with security codes to achieve unconditional communication security

2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC), 2015
This paper investigated unconditional secure communications in a passive eavesdropping (PE)wireless environment via a two-step method under Wyner's model. Firstly, with MIMO transmit beamforming, one can utilize the spatial degree of freedom (DoF) to cripple eavesdroppers' interceptions even though the eavesdropper's CSI is unknown.
null Jie Tang   +3 more
openaire   +1 more source

Multisender authentication systems with unconditional security

1997
We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection.
K. M. Martin, R. Safavi-Naini
openaire   +1 more source

Home - About - Disclaimer - Privacy