Filters








127 Hits in 5.9 sec

Calling Out Cheaters: Covert Security with Public Verifiability [chapter]

Gilad Asharov, Claudio Orlandi
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
• The goal: Whenever there is a cheat detection, the honest party can prove to any third party that there was a cheating attempt • The needed with public verifiability is much smaller than without public  ...  Security Requirements • -covert security • Accountability  ...  " and "Judge" algorithms • We get (roughly) the same complexity as [AL07] but with public verifiability Conclusions • We introduce the notion of "covert security with public verifiability" • Security  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34961-4_41">doi:10.1007/978-3-642-34961-4_41</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7i462l3osndolnu4lqnaedu7aq">fatcat:7i462l3osndolnu4lqnaedu7aq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151217130244/http://www.cs.huji.ac.il/~asharov/slides/AO12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/bc/95bcf9a2e841f9ad7ca4af5d8efa0e8050d92fdc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-34961-4_41"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cheater Detection in SPDZ Multiparty Computation [chapter]

Gabriele Spini, Serge Fehr
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work we revisit the SPDZ multiparty computation protocol by Damgård et al. for securely computing a function in the presence of an unbounded number of dishonest parties.  ...  The correctness ofz is then verified as follows. Step 2: Public Reconstruction.  ...  Furthermore, the SPDZ MPC protocol is such that the cheating party who launches the attack remains covert: the (honest) parties know that there is a cheater among them that caused the protocol to fail,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-49175-2_8">doi:10.1007/978-3-319-49175-2_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cojdpczxfzhhjeizgzipsteqxu">fatcat:cojdpczxfzhhjeizgzipsteqxu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719151240/https://ir.cwi.nl/pub/25035/25035.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f6/2f/f62fa7c3e312f0229b6977bc13f585faa47e20ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-49175-2_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Preprocessing Based Verification of Multiparty Protocols with Honest Majority

Peeter Laud, Alisa Pankova, Roman Jagomägis
<span title="2017-10-01">2017</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/feed3pdnijhbnm6huwkkxavghy" style="color: black;">Proceedings on Privacy Enhancing Technologies</a> </i> &nbsp;
This paper presents a generic "GMW-style" method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification  ...  In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution.  ...  We discuss the difficulties with previous methods in Sec. 2. From covert to active security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2017-0038">doi:10.1515/popets-2017-0038</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/popets/LaudPJ17.html">dblp:journals/popets/LaudPJ17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xndwkfj2gvacxfu5eaecb23qse">fatcat:xndwkfj2gvacxfu5eaecb23qse</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190501135549/https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p23.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/a7/3da7a00b7172ee83aeeb966ab9c696d5c4a356ef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2017-0038"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> degruyter.com </button> </a>

Public Verifiability in the Covert Model (Almost) for Free [chapter]

Vladimir Kolesnikov, Alex J. Malozemoff
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Asharov and Orlandi [AO12] proposed a security model, covert with public verifiability, and an associated protocol, addressing these concerns.  ...  Keywords: secure computation · publicly verifiable covert security * Work partially done while the author was at Bell Labs. embarrassment) is sufficient to deter would-be cheaters.  ...  The authors thank Michael Zohner for a brief discussion on the relative performance of public-and symmetric-key primitives, and the anonymous reviewers for helpful suggestions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48800-3_9">doi:10.1007/978-3-662-48800-3_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ifqkzkbwnjbbhjvewcfyfo3gna">fatcat:ifqkzkbwnjbbhjvewcfyfo3gna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160617014636/https://eprint.iacr.org/2015/1067.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cf/81/cf81847f2e274502192705e98e332d393e13a7b1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48800-3_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Protocols for Secret Santa [chapter]

Sjouke Mauw, Saša Radomirović, Peter Y. A. Ryan
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
If we want to be less explicit with respect to the random factor introduced or the public key, we will simply leave them out, writing {m} instead of {m, r} k .  ...  Indeed, why are notions similar to receipt-freeness, coercion resistance, abuse-freeness and universal verifiability left out?  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-45921-8_26">doi:10.1007/978-3-662-45921-8_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p5ioncd6incgfjfq4skz4f55za">fatcat:p5ioncd6incgfjfq4skz4f55za</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171220175213/http://satoss.uni.lu/members/sjouke/papers/MRR10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/47/a7479c3c0a7fdee9b0425246d5a0e953f071130b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-45921-8_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Physical Zero-Knowledge Proofs of Physical Properties [chapter]

Ben Fisch, Daniel Freund, Moni Naor
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Finally, we explore public observation proofs, an analog of public-coin proofs in the context of PhysicalZK.  ...  In the digital domain, zero-knowledge is an established concept where a prover convinces a verifier of a statement without revealing any information beyond the statement's validity.  ...  by replacing calls to F in π with calls to ρ, then π ρ/F UCemulates π.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_18">doi:10.1007/978-3-662-44381-1_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/avxnea5jtzbkzflhhou73hz4t4">fatcat:avxnea5jtzbkzflhhou73hz4t4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502232450/https://link.springer.com/content/pdf/10.1007%2F978-3-662-44381-1_18.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/65/5a/655ad6a6af06627706f5c812f0f5e6a3b5ab6bc2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

MPC-Friendly Commitments for Publicly Verifiable Covert Security [article]

Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
<span title="2022-01-27">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our constructions operate in the publicly verifiable covert (PVC) security model, which is a relaxation of the malicious model of MPC appropriate in settings where P1 faces a reputational harm if caught  ...  Finally, we present a technique to amplify the security properties our constructions that allows to efficiently recover malicious guarantees with statistical security.  ...  Publicly-verifiable covert (PVC) security.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2109.07461v2">arXiv:2109.07461v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l7nvxevuwjaf3bw53kqsdahmpq">fatcat:l7nvxevuwjaf3bw53kqsdahmpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220130214525/https://arxiv.org/pdf/2109.07461v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/60/fa606a2e339b01089847c758c8d709d9d7e7cb54.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2109.07461v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cooperative Secret Sharing Using QR Codes and Symmetric Keys

Yang-Wai Chow, Willy Susilo, Joseph Tonien, Elena Vlahu-Gjorgievska, Guomin Yang
<span title="2018-04-04">2018</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nzoj5rayr5hutlurimhzyjlory" style="color: black;">Symmetry</a> </i> &nbsp;
The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information.  ...  This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.  ...  The organization can communicate with members of the group by sending out messages with Quick Response (QR) codes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym10040095">doi:10.3390/sym10040095</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7mwu6blf5vavrbap2wdnmazvm4">fatcat:7mwu6blf5vavrbap2wdnmazvm4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503230203/https://res.mdpi.com/symmetry/symmetry-10-00095/article_deploy/symmetry-10-00095.pdf?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/bd/1dbd3c368ba3fc9970a7d6e07abf942e4261be2a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym10040095"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits [chapter]

Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We then construct both a covertly and actively secure preprocessing phase, both of which compare favourably with previous work in terms of efficiency and provable security.  ...  In this paper we both resolve a number of open problems with SPDZ; and present several theoretical and practical improvements to the protocol.  ...  Clearly the above (vague) outline needs to be fleshed out to ensure the required covert security level.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40203-6_1">doi:10.1007/978-3-642-40203-6_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t6nzbkgwrjbaln4ieqesdbwn5u">fatcat:t6nzbkgwrjbaln4ieqesdbwn5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130108013631/http://eprint.iacr.org/2012/642.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e6/9e/e69e44f837662fdc5c49a7ba40666ba7bd5980c0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40203-6_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Pragmatic Introduction to Secure Multi-Party Computation

David Evans, Vladimir Kolesnikov, Mike Rosulek
<span title="">2018</span> <i title="Now Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g7smhlc3gbebjk5nqvygrsqibq" style="color: black;">Foundations and Trends® in Privacy and Security</a> </i> &nbsp;
"Calling Out Cheaters: Covert Security with Public Verifiability". In: Advances in Cryptology -ASIACRYPT 2012. Ed. by X.Wang and K. Sako. Vol. 7658.  ...  There are two main types of secure and verifiable computation: outsourced computation and multi-party computation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1561/3300000019">doi:10.1561/3300000019</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/igylrqmmijeoviw772oaiudvki">fatcat:igylrqmmijeoviw772oaiudvki</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190430024800/https://www.nowpublishers.com/article/DownloadSummary/SEC-019" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/57/7b575aa4a8d388f157f7039646cdf7cf8546acae.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1561/3300000019"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Richer Efficiency/Security Trade-offs in 2PC [chapter]

Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Along the way, we identify a natural security property of garbled circuits called property-enforcing that may be of independent interest.  ...  Indeed, the guarantee of covert 2PC can be unacceptable in such scenarios as a successful adversary may learn the entire input 1 Concretely, suppose Alice passes the circuit-check phase with malicious  ...  This is indeed the notion of -CovIDA Security recently introduced in [MR13] which augments the notion of Covert Security of [AL07] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_11">doi:10.1007/978-3-662-46494-6_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f5bgnkma25fcthpxhwkm24oisa">fatcat:f5bgnkma25fcthpxhwkm24oisa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160309171752/http://eprint.iacr.org/2015/055.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/68/ea/68eacd088cbcdc145d83dd94e5ec398d5b66560d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Efficient Secure Multiparty Computation with Identifiable Abort [chapter]

Carsten Baum, Emmanuela Orsini, Peter Scholl
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We study secure multiparty computation (MPC) in the dishonest majority setting providing security with identifiable abort, where if the protocol aborts, the honest parties can agree upon the identity of  ...  Our protocol has an information-theoretic online phase with message complexity O(n 2 ) for each secure multiplication (where n is the number of parties), similar to the BDOZ protocol (Bendlin et al., Eurocrypt  ...  [LZ13] . 8 From MPC with Identifiable Abort to MPC with Public Verifiability.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_18">doi:10.1007/978-3-662-53641-4_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uajn77hcjbfvrdqfxhyk75ibbi">fatcat:uajn77hcjbfvrdqfxhyk75ibbi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160617042823/https://eprint.iacr.org/2016/187.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/49/fa49cb484e3576876f422a3590c2e9dc3a74d489.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Code Based Cryptography and Steganography [chapter]

Pascal Véron
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The aim of this paper is to show how algebraic coding theory offers ways to define secure cryptographic primitives and efficient steganographic schemes. Cryptography  ...  Combining this trick with the preceeding one, a [1633, 1297, 49] code over F 7 with 2 extra errors achieves a security level of 2 128 and leads to a public matrix of 1223423 bits [20] .  ...  A ring signature scheme A t-out-of-N threshold ring signature scheme is a protocol which enable any t participating users belonging to a set of N users to produce a signature in such a way that the verifier  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40663-8_5">doi:10.1007/978-3-642-40663-8_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t4a63pdm2bbtddmfm7uimzlmdu">fatcat:t4a63pdm2bbtddmfm7uimzlmdu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923233751/https://hal.inria.fr/hal-00828034/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/2f/0f2f98bb89c95c570d2b68e1f1322fff3865fb95.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-40663-8_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies [article]

Sarah Azouvi, Alexander Hicks
<span title="2020-02-21">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This issue arises due to the gap between Cryptography and Distributed Systems security, which deals with traditional security problems that ignore the explicit consideration of incentives, and Game Theory  ...  , which deals best with situations involving incentives.  ...  Then any secure computation with respect to covert adversaries with deterrent (probability of getting caught cheating) 1 2 is an implementation of the mediator as the expected utility of a cheating player  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.08595v2">arXiv:1905.08595v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qmg2qtn3avf4jlqaorbnix3t4e">fatcat:qmg2qtn3avf4jlqaorbnix3t4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321045422/https://arxiv.org/pdf/1905.08595v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1905.08595v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Security Analysis of Blockchain-based DID Services

Bong Gon Kim, Young-Seob Cho, Seok-hyun Kim, Hyoungshick Kimb, Simon S. Woo
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
DID is designed to enable the minimum disclosure of the proof from a user's credentials on a need-to-know basis with a contextualized delegation.  ...  Lastly, we discuss the possible countermeasures against the security threats we identified.  ...  For herd privacy, the SVC with the AP address is also converted into another commitment, called AP Address Commitment (APAC).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3054887">doi:10.1109/access.2021.3054887</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jvcjhgeiy5aclikgv4m6gnpnlm">fatcat:jvcjhgeiy5aclikgv4m6gnpnlm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429111358/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09336711.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/fc/ecfc58fac4a71c03b74e84c66b62aa460d9f6fa5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3054887"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 127 results