Commitment scheme

Results: 216



#Item
51Batch Proofs of Partial Knowledge? Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Batch Proofs of Partial Knowledge? Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-05-03 09:29:37
52Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk

Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-06 11:06:02
53A hybrid architecture for interactive verifiable computation Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin questions of the prover, and applies efficient tests to the

A hybrid architecture for interactive verifiable computation Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin questions of the prover, and applies efficient tests to the

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-03-12 01:21:32
54Verifying computations with state Benjamin Braun, Ariel J. Feldman⋆ , Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin ⋆ University of Pennsylvania Abstract When

Verifying computations with state Benjamin Braun, Ariel J. Feldman⋆ , Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin ⋆ University of Pennsylvania Abstract When

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-11-03 21:16:02
55Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1  2

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-06-02 16:07:22
56How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
57Information Fair Trader Scheme commitment I am personally committed to trading fairly in information. To show the strength of my commitment, I have applied for Information Fair Trader accreditation from the Director of t

Information Fair Trader Scheme commitment I am personally committed to trading fairly in information. To show the strength of my commitment, I have applied for Information Fair Trader accreditation from the Director of t

Add to Reading List

Source URL: www.dfpni.gov.uk

Language: English - Date: 2014-10-15 03:43:20
58SPEED.VALUE.QUALITY.COMMITMENT March 2010 Newsletter >> FEATURE ARTICLE — KYOTO PROTOCOL UPDATE The Costs Of Doing Business… The Carbon Pollution Reduction Scheme (CPRS) will

SPEED.VALUE.QUALITY.COMMITMENT March 2010 Newsletter >> FEATURE ARTICLE — KYOTO PROTOCOL UPDATE The Costs Of Doing Business… The Carbon Pollution Reduction Scheme (CPRS) will

Add to Reading List

Source URL: www.jacksonlalic.com.au

Language: English - Date: 2013-04-09 01:17:55
59How to Go Beyond the Black-Box Simulation Barrier Boaz Barak∗ December 30, 2008 Abstract The simulation paradigm is central to cryptography. A simulator is an algorithm that tries

How to Go Beyond the Black-Box Simulation Barrier Boaz Barak∗ December 30, 2008 Abstract The simulation paradigm is central to cryptography. A simulator is an algorithm that tries

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:40
60Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗  Christina Brzuska‡

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50