نتایج جستجو برای: guarantees and parties responsibility

تعداد نتایج: 16836158  

Journal: :IACR Cryptology ePrint Archive 2016
Geoffroy Couteau

Is it feasible for parties to securely evaluate a function on their joint inputs, while hiding not only their private input, but even the very fact that they are taking part to the protocol? This intriguing question was given a positive answer in the two-party case at STOC’05, and in the general case at FOCS’07, under the name of covert multiparty computation (CMPC). A CMPC protocol allows n pl...

2008
Duc-Phong Le Alexis Bonnecaze Alban Gabillon

The aim of timestamping systems is to provide a proof-of-existence of a digital document at a given time. By timestamping a digital document after it has been signed by concerned parties, we know when the document was signed. Timestamping services also provide the non-repudiation and long term properties for digital signatures. Combining both digital signature and provable timestamping guarante...

Journal: :European View 2013

Journal: :IACR Cryptology ePrint Archive 2008
Maria Isabel Gonzalez Vasco Florian Hess Rainer Steinwandt

Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair—so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of...

2010
Claudio Agostino Ardagna Sushil Jajodia Pierangela Samarati Angelos Stavrou

We present a novel hybrid communication protocol that guarantees mobile users’ k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing anonymity schemes, we consider all parties that can intercept communications between the mobile user and a server as potential privacy threats. We formally qu...

1995
Caroline Weill

OVERVIEW OF FRANCE F rance is an industrialized country with a large agricultural sector. Its population in 1991 totaled 57 million. According to the Constitution of 1958, France is organized as a parliamentary democratic republic. Separation of legislative and executive powers, multiplicity of political parties, and respect for the Constitution and the Human Rights Declaration are the guaranti...

2014
Peeter Laud Alisa Pankova

We present a generic method for turning passively secure protocols into protocols secure against covert attacks. The method adds a post-execution verification phase to the protocol that allows a misbehaving party to escape detection only with negligible probability. The execution phase, after which the computed protocol result is already available for parties, has only negligible overhead added...

Journal: :IACR Cryptology ePrint Archive 2014
Ruxandra F. Olimid

Verifiable Secret Sharing (VSS) guarantees that honest parties reconstruct a consistent secret even in the presence of a malicious dealer that distributes invalid shares. We empower the dishonest dealer and consider the case when he subliminally leaks information in valid shares, allowing an adversary to access the secret prior to the reconstruction phase. We define the concept of Dealer-Leakag...

Journal: :Sultan Agung Notary Law Review 2022

Legal Counseling is carried out by providing clear, directed explanations, so that the meaning and purpose of authentic deed are easily understood parties. Sometimes people only provide explanations documents without knowing legal issues. Article 15 paragraph 2 letter e Act No. 2014 explains that, "in addition to authority as referred in (1), Notary also authorized to: counseling connection wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید