Filters








167,171 Hits in 3.0 sec

Multi-party protocols

Ashok K. Chandra, Merrick L. Furst, Richard J. Lipton
1983 Proceedings of the fifteenth annual ACM symposium on Theory of computing - STOC '83  
We now examine the inherent communication complexity of multi-party protocols.  ...  The lower bounds for multi-party protocols give lower bounds on the space and time of branching programs.  ... 
doi:10.1145/800061.808737 dblp:conf/stoc/ChandraFL83b fatcat:epclhsjm2nhktekh6wxnpqplru

Circuits and multi-party protocols

V. Grolmusz
1998 Computational Complexity  
We present a multi-party protocol for computing certain functions of an n x k 0 -1 matrix A. The protocol is for k players, where player i knows every column of A, except column i.  ...  The cost of a multi-party protocol is the maximum number of bits communicated for any A from {O, 1 }nle.  ...  We say that aG is multi-party ea8Y if3c > 0 such that for all gn,k E G C(k)(gn,k) ~ 2 ck log n. Let ME denote the family of all multi-party easy sets.  ... 
doi:10.1007/pl00001592 fatcat:ufrbodqmgnf6xecitzs5qc4ye4

Improved two-party and multi-party purification protocols [article]

Elitza N. Maneva, John A. Smolin
2000 arXiv   pre-print
Our results are compared to previous protocols.  ...  We present an improved protocol for entanglement purification of bipartite mixed states using several states at a time rather than two at a time as in the traditional recurrence method.  ...  Figure 1 . 1 The multi-party XOR.  ... 
arXiv:quant-ph/0003099v1 fatcat:3lsdrcsx2ng2ppdjcrlaizahuq

Multi-Party Protocols, Information Complexity and Privacy [article]

Iordanis Kerenidis, Adi Rosén, Florent Urrutia
2018 arXiv   pre-print
We introduce a new information theoretic measure that we call Public Information Complexity (PIC), as a tool for the study of multi-party computation protocols, and of quantities such as their communication  ...  ; any communication protocol can be compressed to its Public Information Cost; an explicit calculation of the zero-error Public Information Complexity of the k-party, n-bit Parity function, where a player  ...  Observe that we consider here oblivious multi-party protocols.  ... 
arXiv:1606.06872v3 fatcat:vsyle7o5gbgwfhftnnpp32xmgi

A Multi-Party Non-Repudiation Protocol [chapter]

Steve Kremer, Olivier Markowitch
2000 IFIP Advances in Information and Communication Technology  
We present a multi-party non-repudiation protocol, based on a group encryption scheme.  ...  Our definitions and the resulting protocol are more general than the ones given in the only comparable work, a multi-party certified mail protocol.  ...  The requirements of a multi-party non-repudiation protocol shall be defined as well.  ... 
doi:10.1007/978-0-387-35515-3_28 fatcat:fmzc7aej6zglrmuejo3z5py7hm

Optimized multi‐party certified email protocols

Jianying Zhou, Jose Onieva, Javier Lopez
2005 Information Management & Computer Security  
In this paper, we present two optimized multi-party certified email protocols.  ...  But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient.  ...  Further Extension to Multi-Party Scenario Here we further extend Micali's two-party CEM protocol to a multi-party scenario with asynchronous timeliness as well.  ... 
doi:10.1108/09685220510627250 fatcat:6nrfavwrhrcjhofjk7lqvxazhi

Fair multi-party non-repudiation protocols

Steve Kremer, Olivier Markowitch
2003 International Journal of Information Security  
In this paper we introduce the concept of multi-party nonrepudiation protocols.  ...  We define the aims of multi-party non-repudiation protocols, compare them to multi-party fair exchange and show some fundamental differences.  ...  In comparison, a multi-party non-repudiation protocol is similar to the needs of a multi-party certified e-mail protocol.  ... 
doi:10.1007/s10207-003-0019-3 fatcat:yxoabvo3onfx3bwakpwm2e4tqa

Quantum And Relativistic Protocols For Secure Multi-Party Computation [article]

Roger Colbeck
2011 arXiv   pre-print
The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown.  ...  This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss.  ...  Security Definitions In Secure Multi-Party Computation Phrasing security definitions for secure multi-party computations requires some care.  ... 
arXiv:0911.3814v2 fatcat:qmw2mm6rrnhgdhtjmjjhbgmbme

Constructing Optimistic Multi-party Contract Signing Protocols

Barbara Kordy, Saa Radomirovic
2012 2012 IEEE 25th Computer Security Foundations Symposium  
We give an explicit, general construction for optimistic multi-party contract signing protocols.  ...  This permits a wide variety of protocols to be handled equally by the trusted third party. We give tight conditions under which the resulting protocols satisfy fairness and timeliness.  ...  She could do this by carrying out a multi-party contract signing (MPCS) protocol.  ... 
doi:10.1109/csf.2012.23 dblp:conf/csfw/KordyR12 fatcat:oqk6sxemzfec5pxiqptsfgx3fe

Exclusion-Freeness in Multi-party Exchange Protocols [chapter]

Nicolás González-Deleito, Olivier Markowitch
2002 Lecture Notes in Computer Science  
In this paper we define a property for multi-party protocols called exclusion-freeness.  ...  Finally, we propose a new multi-party fair exchange protocol with an online trusted third party respecting the strong exclusion-freeness property.  ...  Our aim is to introduce a property devoted to multi-party protocols called exclusion-freeness. We illustrate it in the framework of an existing multi-party fair exchange protocol with an online TTP.  ... 
doi:10.1007/3-540-45811-5_15 fatcat:3yoz4khpcbeafg7dkv2def6hp4

A Multi-party Optimistic Non-repudiation Protocol [chapter]

Olivier Markowitch, Steve Kremer
2001 Lecture Notes in Computer Science  
Finally, we generalize our protocol and propose a multi-party non-repudiation protocol with off-line trusted third party.  ...  Afterwards, we define the multi-party non-repudiation problem, showing some differences with multi-party fair exchange. The requirements of a multi-party non-repudiation protocol are defined as well.  ...  Conclusion We have defined multi-party non-repudiation and presented a generalization of an optimistic two-party non-repudiation protocol to an n-party non-repudiation protocol.  ... 
doi:10.1007/3-540-45247-8_9 fatcat:3fvf7z6d3zae5oca26sxniph6m

Practical Multi-party Private Set Intersection Protocols

Asli Bay, Zekeriya Erkin, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
2021 IEEE Transactions on Information Forensics and Security  
Although several efficient two-party PSI protocols already exist, protocols for PSI in the multi-party setting (MPSI) currently scale poorly with a growing number of parties, even though this applies to  ...  The first protocol is a multi-party PSI, whereas the second provides a more subtle functionalitythreshold multi-party PSI (T-MPSI) -which outputs items of the server that appear in at least some number  ...  Majid Nateghizad for helping them in analysing the security of the Secure Comparison Protocol used in this paper.  ... 
doi:10.1109/tifs.2021.3118879 fatcat:5v2zdhzwjfbkzk6w434yuxvpxi

Strongvelope Multi-Party Encrypted Messaging Protocol design document [article]

Guy Kloss
2016 arXiv   pre-print
In this document we describe the design of a multi-party messaging encryption protocol "Strongvelope".  ...  We hope that it will prove useful to people interested in understanding the inner workings of this protocol as well as cryptography and security experts to review the underlying concepts and assumptions  ...  CHAPTER ONE STRONGVELOPE MULTI-PARTY ENCRYPTED MESSAGING PROTOCOL In this document we describe the design of a multi-party messaging encryption protocol "Strongvelope".  ... 
arXiv:1606.04593v1 fatcat:7ryox3az45glnmvvg2nwzlvorq

mpENC Multi-Party Encrypted Messaging Protocol design document [article]

Ximin Luo, Guy Kloss
2016 arXiv   pre-print
By secure we mean for the actual users i.e. end-to-end security, as opposed to "secure" for irrelevant third parties.  ...  We aim towards a general-purpose unified protocol.  ...  Utilities Multi-Party Encrypted MessagingProtocol design document, Release 0.1-4-g75e6b2d .2. Membership changes .2.  ... 
arXiv:1606.04598v1 fatcat:yygtbqrhffbzdnborlrr4kmine

Multi-party authenticated key agreement protocols from multi-linear forms

Young-Ran Lee, Hyang-Sook Lee, Ho-Kyu Lee
2004 Applied Mathematics and Computation  
Recently, Boneh and Silverleg [4] studied multilinear forms, which provides a one round multi-party key agreement protocol.  ...  In this paper, we propose (n + 1) types of one round authenticated multi-party key agreement protocols from multilinear forms based on the application of MTI and MQV protocols.  ...  One round multi-party authenticated key agreement protocols The one round multi-party key agreement protocol I is established via just one round broadcast per entity.  ... 
doi:10.1016/j.amc.2003.10.018 fatcat:w2i7mjhe3jbd5kzyhswngpalsm
« Previous Showing results 1 — 15 out of 167,171 results