Zero-knowledge proof

Results: 211



#Item
41Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-28 21:51:08
42LOGO_SECURITYANDTRUSTE_RUSH_36

LOGO_SECURITYANDTRUSTE_RUSH_36

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:51:00
43ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

Add to Reading List

Source URL: esorics2015.sba-research.org

Language: English - Date: 2015-09-22 04:03:47
44Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

Privacy-Preserving Observation in Public Spaces Florian Kerschbaum1 and Hoon Wei Lim2 1 SAP Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2015-06-23 05:52:39
45Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-11-04 03:36:30
46

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-08-16 11:41:06
47Efficient Secure Two-Party Protocols: Techniques and Constructions

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
48BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied  BRICS Basic Research in Computer Science

BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-04-06 04:06:17
49Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust†  Carmit Hazay‡

Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-10-04 08:09:02
50BRICS  Basic Research in Computer Science BRICS RSJ. Groth: Extracting Witnesses from Proofs of Knowledge  Extracting Witnesses from Proofs of

BRICS Basic Research in Computer Science BRICS RSJ. Groth: Extracting Witnesses from Proofs of Knowledge Extracting Witnesses from Proofs of

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2002-01-04 07:13:38