Results 261 to 270 of about 2,069,680 (303)
Some of the next articles are maybe not open access.
zkSNARKs in the ROM with Unconditional UC-Security
IACR Cryptology ePrint ArchiveAlessandro Chiesa, Giacomo Fenzi
semanticscholar +2 more sources
Unconditional secure communication: a Russian Cards protocol
Journal of Combinatorial Optimization, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Duan, Zhenhua, Yang, Chen
openaire +2 more sources
Quantum ANDOS Protocol with Unconditional Security
2006All-or-Nothing Disclosure of Secrets, or ANDOS for brevity, is an interesting cryptographic task, which involves two parties, say Alice and Bob. Alice has a few secrets, which she regards as equally valuable. She would like to sell any of them to Bob, with the guarantee that no information about the other secrets will be obtained if he pays for only ...
Wei Yang +3 more
openaire +1 more source
Anonymous Traceability Schemes with Unconditional Security
2000In this paper we propose a model for anonymous traceability scheme with unconditional security. The model uses two subsystems: an authentication code with arbiter (A3-code) and an asymmetric traceability with unconditional security. We analyse security of the system against possible attacks and show that security parameters of the system can be ...
Reihaneh Safavi-Naini, Yejing Wang
openaire +1 more source
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security
2021Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction phase. The benefit is that the outside adversary cannot learn the secret even if it is recovered by more than t shareholders.
Min Xiao, Zhe Xia
openaire +1 more source
Unconditional secure conference key distribution schemes with disenrollment capability
Information Sciences, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo, CRESTI A.
openaire +3 more sources
Proof of unconditional security of six-state quantum key distribution scheme
Quantum information & computation, 2001We prove the unconditional security of the standard six-state scheme for quantum key distribution (QKD). We demonstrate its unconditional security up to a bit error rate of 12.7 percents, by allowing only one-way classical communications in the error ...
H. Lo
semanticscholar +1 more source
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
2017Brzuska et. al. (Crypto 2011) proved that unconditional UC-secure computation is possible if parties have access to honestly generated physically unclonable functions (PUFs). Dachman-Soled et. al. (Crypto 2014) then showed how to obtain unconditional UC secure computation based on malicious PUFs, assuming such PUFs are stateless.
Badrinarayanan, Saikrishna +3 more
openaire +3 more sources
Combining MIMO beamforming with security codes to achieve unconditional communication security
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC), 2015This paper investigated unconditional secure communications in a passive eavesdropping (PE)wireless environment via a two-step method under Wyner's model. Firstly, with MIMO transmit beamforming, one can utilize the spatial degree of freedom (DoF) to cripple eavesdroppers' interceptions even though the eavesdropper's CSI is unknown.
null Jie Tang +3 more
openaire +1 more source
Multisender authentication systems with unconditional security
1997We consider an extension of the classical model of unconditionally secure authentication in which a single transmitter is replaced by a group of transmitters such that only certain specified subsets can generate authentic messages. We provide a model and derive sufficient conditions for systems that provide perfect protection.
K. M. Martin, R. Safavi-Naini
openaire +1 more source

