Private randomness expansion with untrusted devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomness expansion from untrusted quantum devices

Is it possible to obtain provable random numbers from an untrusted source? This question, if it can be answered affirmatively, is of great importance in cryptography, where random numbers are ubiquitous and it is necessary to guard against highly intelligent adversaries. Bad randomness is a problem: researchers have broken a large number of RSA keys on the internet due to insufficient randomnes...

متن کامل

Private Secure Randomness

" To estimate the value of the CHSH inequality, we accumulate n = 3,016 successive entanglement events over the period of about one month. "

متن کامل

Multi-party Private Web Search with Untrusted Partners

Web search engines are tools employed to find specific information in the Internet. However, they also represent a threat for the privacy of their users. This happens because the web search engines store and analyze the personal information that the users reveal in their queries. In order to avoid this privacy threat, it is necessary to provide mechanisms that protect the users of these tools. ...

متن کامل

Distributed system for private web search with untrusted partners

Web search engines (WSEs) are tools that allow users to retrieve specific contents from the Internet. However, during this process, users’ queries and related information (e.g., query time, browser type, etc.) are stored and analyzed in the WSE database. The stored logs may contain sensitive information (e.g., health issues, location, religion, etc.) and identifiers (e.g., full name, IP address...

متن کامل

Private aggregation on untrusted servers with customizable thresholds

While multiparty computations are becoming more and more efficient, their performance has not yet reached the level needed to be widely deployed for many applications. Nevertheless, the heterogeneous environment of modern computing needs this functionality in order to provide users their right to privacy. For a wide range of applications there is no need for complex computations; operations suc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics A: Mathematical and Theoretical

سال: 2011

ISSN: 1751-8113,1751-8121

DOI: 10.1088/1751-8113/44/9/095305