Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Alex Escala"'
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662533567
Financial Cryptography Workshops
Financial Cryptography Workshops
In electronic voting, we say that a protocol has cast-as-intended verifiability if the contents of each encrypted vote can be audited in order to ensure that they match the voter’s selections. It is traditionally thought that this verification can
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd4fbcd950cf8c26a333cb8123fc47a5
https://doi.org/10.1007/978-3-662-53357-4_16
https://doi.org/10.1007/978-3-662-53357-4_16
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319222691
VOTE-ID
VOTE-ID
One way to build secure electronic voting systems is to use Mix-Nets, which break any correlation between voters and their votes. One of the characteristics of Mix-Net-based eVoting is that ballots are usually decrypted individually and, as a consequ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb8d06deceec1d039ef329d916b7cddf
https://doi.org/10.1007/978-3-319-22270-7_6
https://doi.org/10.1007/978-3-319-22270-7_6
Autor:
Alex Escala, Jens Groth
Publikováno v:
Proceedings of Practice and Theory in Public-Key Cryptography 2014.
Autor:
Jens Groth, Alex Escala
Publikováno v:
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
Public Key Cryptography
Groth-Sahai proofs are efficient non-interactive zero-knowledge proofs that have found widespread use in pairing-based cryptography. We propose efficiency improvements of Groth-Sahai proofs in the SXDH setting, which is the one that yields the most e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::19cfae4f46a63519ac64c2c6b251429f
https://doi.org/10.1007/978-3-642-54631-0_36
https://doi.org/10.1007/978-3-642-54631-0_36
Publikováno v:
SECRYPT
Scopus-Elsevier
Scopus-Elsevier
Quick Response (QR) codes, used to store machine readable information, have become very commonnowa days and have found many applications in different scenarios. One of such applications is electronic voting systems. Indeed, some electronic voting sys
Publikováno v:
Recercat. Dipósit de la Recerca de Catalunya
instname
ResearcherID
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
instname
ResearcherID
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
Comunicació presentada a: PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, celebrada a Buenos Aires, Argentina, del 26 al 28 de març de 2014 Lossy trapdoor functions, introduced by Peikert and Waters (STOC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7886d976165561170984253f63f94ba
http://hdl.handle.net/10230/42228
http://hdl.handle.net/10230/42228
Publikováno v:
Revista Colombiana de Computación, Vol 23, Iss 2 (2022)
La toma de decisiones en las unidades de negocio de la Banca por Internet Empresas del sector financiero es de gran importancia, ya que permiten aportar a la transformación digital y a la innovación de sus clientes. Sin embargo, para obtener la inf
Externí odkaz:
https://doaj.org/article/d67d78cfda2d4776a43e6a0c05a24924
Publikováno v:
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
Recercat. Dipósit de la Recerca de Catalunya
instname
Advances in Cryptology – CRYPTO 2013 ISBN: 9783642400834
CRYPTO (2)
Universitat Politècnica de Catalunya (UPC)
Recercat. Dipósit de la Recerca de Catalunya
instname
Advances in Cryptology – CRYPTO 2013 ISBN: 9783642400834
CRYPTO (2)
Comunicació presentada a: CRYPTO 2013 The 33rd Annual Cryptology Conference, celebrada del 18 al 22 d'agost de 2013 a Santa Bàrbara, Califòrnia, Estats Units d'Amèrica. We put forward a new algebraic framework to generalize and analyze Di_e-Hellm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2146704273d71a69463fb35c1b4158b9
http://hdl.handle.net/10230/42257
http://hdl.handle.net/10230/42257
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642219689
AFRICACRYPT
AFRICACRYPT
An attribute-based signature with respect to a signing policy, chosen ad-hoc by the signer, convinces the verifier that the signer holds a subset of attributes satisfying that signing policy. The verifier must obtain no other information about the id
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3055c12244d61bf29c6d5f652fa56cca
https://doi.org/10.1007/978-3-642-21969-6_14
https://doi.org/10.1007/978-3-642-21969-6_14