IACR Local SearchPossible queries include
Found 20000 results
The SPEKE protocol is commonly considered one of the classic Password Authenticated Key Exchange (PAKE) schemes. It has been included in international standards (particularly, ISO/IEC 11770-4 and IEEE 1363.2) and deployed in...last revised 25 Sep 2014
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic ``fairy-ring dance'' construction that transforms any secure two-party PAKE scheme to a group PAKE protocol while...last revised 11 Feb 2015
Bitcoin as deployed today does not scale. Scalability research has focused on two directions: 1) redesigning the Blockchain protocol, and 2) facilitating `off-chain transactions' and only consulting the Blockchain if an...last revised 26 Apr 2016
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and the two dominant Payment Processors: Coinbase...last revised 12 Jan 2016
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
We present the first implementation of a decentralised and self-tallying internet voting protocol with maximum voter privacy using the Blockchain. The Open Vote Network is suitable for boardroom elec- tions and is written as a...received 10 Feb 2017
Classroom voting is an important pedagogical technique in which students learn by voting on the answers to questions. The same voting platform is also often used for exercises such as rating lecturer performance and voting for...last revised 23 Jun 2017
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a...last revised 25 Oct 2010
In the most strict formal definition of security for password-authenticated key exchange, an adversary can test at most one password per impersonation attempt. We propose a slightly relaxed definition which restricts an...received 19 Jul 2001
Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the...last revised 11 Jul 2016
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project PKC 2008: Barcelona, Spain Ronald Cramer (Ed.): Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and...
Florida Atlantic University, USA
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware
External Reviewers, IACR ASIACRYPT 2010 Michel Abdalla Johan Aberg Shweta Agarwal Martin Agren Hadi Ahmadi Amy Alford Joel Alwen Elena Andreeva Frederik Armknecht Nuttapong Attrapadung Man Ho Au Paul Baecher Joonsang Baek Kfir...
Newcastle University, UK
Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major e- commerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin...last revised 25 Sep 2015
We propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private...received 21 Apr 2012
IACR ASIACRYPT 2008, External Reviewers Michel Abdalla Hadi Ahmadi Kennichiro Akai Jesus Almansa Elena Andreeva Kazumaro Aoki François Arnault Mina Askari Mandal Avradip Joonsang Baek Endre Bangerter Gregory Bard Rana Barua...
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at...received 5 May 2016