Private simultaneous messages based on quadratic residues
Abstract
References
Recommendations
Minimal logarithmic signatures for one type of classical groups
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like $$MST_1$$MST1, $$MST_2$$MST2 and $$MST_3$$...
Unconditionally secure disjointness tests for private datasets
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals ...
Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation
Progress in Cryptology – INDOCRYPT 2019AbstractIn an influential work aimed at understanding the communication requirements of secure computation, Feige, Kilian and Naor introduced a minimal model of secure computation (STOC 1994). In that work, among other results, Feige et al. presented a ...
Comments
Information & Contributors
Information
Published In
Publisher
Kluwer Academic Publishers
United States
Publication History
Author Tags
Author Tags
Qualifiers
- Research-article
Funding Sources
- Japan Society for the Promotion of Science
- Japan Science and Technology Corporation
- Japan Society for the Promotion of Science
- Japan Science and Technology Corporation
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in