VI Preface methods from information theory. Unconditionally secure schemes are now addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
This handbook provides an up-to-date compendium of fundamental computer science topics, techniques, and applications. Along with updating and revising many of the existing …
HY Lin, WG Tzeng - Applied Cryptography and Network Security: Third …, 2005 - Springer
We proposed a two-round protocol for solving the Millionaires' Problem in the setting of semi- honest parties. Our protocol uses either multiplicative or additive homomorphic encryptions …
I Damgard, M Geisler… - International Journal of …, 2008 - inderscienceonline.com
We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our …
Much work has been done in recent decades to apply sophisticated cryptographic techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
I Damgård, M Geisler, M Krøigaard - … 2007, Townsville, Australia, July 2-4 …, 2007 - Springer
We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our …
M Fischlin - Annual International Cryptology Conference, 2005 - Springer
We show how to turn three-move proofs of knowledge into non-interactive ones in the random oracle model. Unlike the classical Fiat-Shamir transformation our solution supports …
K Gjøsteen - E-Voting and Identity: Third International Conference …, 2012 - Springer
The Norwegian government will run a trial of internet remote voting during the 2011 local government elections. A new cryptographic voting protocol will be used, where so-called …
J Groth - Applied Cryptography and Network Security: Third …, 2005 - Springer
In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends it in to the authorities that tally the votes. If voters can send in arbitrary plaintexts then they …