×

Found 60 Documents (Results 1–60)

Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric. (English) Zbl 1519.94092

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 249-271 (2023).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Hide a liar: card-based ZKP protocol for Usowan. (English) Zbl 07722842

Du, Ding-Zhu (ed.) et al., Theory and applications of models of computation. 17th annual conference, TAMC 2022, Tianjin, China, September 16–18, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13571, 201-217 (2023).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Card-based ZKP protocol for Nurimisaki. (English) Zbl 1522.94086

Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 285-298 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Perpetual torus exploration by myopic luminous robots. (English) Zbl 1522.68599

Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 164-177 (2022).
MSC:  68T40 68W15
PDFBibTeX XMLCite
Full Text: DOI

Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes. (English) Zbl 1492.94186

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13177, 409-438 (2022).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic plaintext equality and inequality proofs. (English) Zbl 1491.94040

Borisov, Nikita (ed.) et al., Financial cryptography and data security. 25th international conference, FC 2021, virtual event, March 1–5, 2021. Revised selected papers. Part I. Berlin: Springer. Lect. Notes Comput. Sci. 12674, 415-435 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori. (English) Zbl 07495184

De Mol, Liesbeth (ed.) et al., Connecting with computability. 17th conference on computability in Europe, CiE 2021, virtual event, Ghent, Belgium, July 5–9, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12813, 373-384 (2021).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI HAL

Physical zero-knowledge proof for Suguru puzzle. (English) Zbl 1517.68139

Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 22nd international symposium, SSS 2020, Austin, TX, USA, November 18–21, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12514, 235-247 (2020).
MSC:  68Q17 68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure cumulative reward maximization in linear stochastic bandits. (English) Zbl 1518.68293

Nguyen, Khoa (ed.) et al., Provable and practical security. 14th international conference, ProvSec 2020, Singapore, November 29 – December 1, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12505, 257-277 (2020).
MSC:  68T05 91A60 94A60
PDFBibTeX XMLCite
Full Text: DOI

Card-based ZKP protocols for Takuzu and Juosan. (English) Zbl 1515.91039

Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 20, 21 p. (2020).
MSC:  91A46 94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding water on Poleless using melomaniac myopic chameleon robots. (English) Zbl 1515.68361

Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 6, 19 p. (2020).
MSC:  68W15 68T40
PDFBibTeX XMLCite
Full Text: DOI

Secure best arm identification in multi-armed bandits. (English) Zbl 1498.68101

Heng, Swee-Huay (ed.) et al., Information security practice and experience. 15th international conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11879, 152-171 (2019).
MSC:  68P27 68Q87 94A60
PDFBibTeX XMLCite
Full Text: DOI

A physical ZKP for Slitherlink: how to perform physical topology-preserving computation. (English) Zbl 1497.68388

Heng, Swee-Huay (ed.) et al., Information security practice and experience. 15th international conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11879, 135-151 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Infinite grid exploration by disoriented robots. (English) Zbl 07176669

Censor-Hillel, Keren (ed.) et al., Structural information and communication complexity. 26th international colloquium, SIROCCO 2019, L’Aquila, Italy, July 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11639, 340-344 (2019).
MSC:  68Mxx 68R10
PDFBibTeX XMLCite
Full Text: DOI arXiv

Interactive physical zero-knowledge proof for Norinori. (English) Zbl 07172837

Du, Ding-Zhu (ed.) et al., Computing and combinatorics. 25th international conference, COCOON 2019, Xi’an, China, July 29–31, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11653, 166-177 (2019).
MSC:  68Rxx
PDFBibTeX XMLCite
Full Text: DOI HAL

Efficient invisible and unlinkable sanitizable signatures. (English) Zbl 1465.94093

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11442, 159-189 (2019).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain. (English) Zbl 07142682

Hierons, Robert Mark (ed.) et al., Theoretical aspects of computing – ICTAC 2019. 16th international colloquium, Hammamet, Tunisia, October 31 – November 4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11884, 292-312 (2019).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures. (English) Zbl 1522.94099

Capkun, Srdjan (ed.) et al., Cryptology and network security. 16th international conference, CANS 2017, Hong Kong, China, November 30 – December 2, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11261, 203-226 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Physical zero-knowledge proof for Makaro. (English) Zbl 1519.68103

Izumi, Taisuke (ed.) et al., Stabilization, safety, and security of distributed systems. 20th international symposium, SSS 2018, Tokyo, Japan, November 4–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11201, 111-125 (2018).
MSC:  68Q10 91A44 94A60
PDFBibTeX XMLCite
Full Text: DOI

A cryptographer’s Conspiracy Santa. (English) Zbl 1453.68080

Ito, Hiro (ed.) et al., 9th international conference on fun with algorithms, FUN 2018, June 13–15, 2018, La Maddalena Island, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 100, Article 13, 13 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Anonymizable ring signature without pairing. (English) Zbl 1403.94095

Cuppens, Frédéric (ed.) et al., Foundations and practice of security. 9th international symposium, FPS 2016, Québec City, QC, Canada, October 24–25, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-51965-4/pbk; 978-3-319-51966-1/ebook). Lecture Notes in Computer Science 10128, 214-222 (2017).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Verifiable private polynomial evaluation. (English) Zbl 1439.94021

Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 487-506 (2017).
MSC:  94A60 68P25 68P27
PDFBibTeX XMLCite
Full Text: DOI HAL

Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen. (English) Zbl 1369.91037

Demaine, Erik D. (ed.) et al., 8th international conference on fun with algorithms, FUN 2016, La Maddalena, Italy, June 8–10, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-005-7). LIPIcs – Leibniz International Proceedings in Informatics 49, Article 8, 20 p. (2016).
MSC:  91A46 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Related-key cryptanalysis of Midori. (English) Zbl 1411.94060

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 287-304 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Formal verification of e-auction protocols. (English) Zbl 1390.68078

Basin, David (ed.) et al., Principles of security and trust. Second international conference, POST 2013, held as part of the European joint conferences on theory and practice of software, ETAPS 2013, Rome, Italy, March 16–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36829-5/pbk). Lecture Notes in Computer Science 7796, 247-266 (2013).
MSC:  68M12 68M11 68P25 68Q60 68T15 91B26
PDFBibTeX XMLCite
Full Text: DOI

Brandt’s fully private auction protocol revisited. (English) Zbl 1312.94045

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 88-106 (2013).
MSC:  94A60 91B26
PDFBibTeX XMLCite
Full Text: DOI arXiv

On unique decomposition of processes in the applied \(\pi\)-calculus. (English) Zbl 1260.68265

Pfenning, Frank (ed.), Foundations of software science and computation structures. 16th international conference, FOSSACS 2013, held as part of the European joint conferences on theory and practice of software, ETAPS 2013, Rome, Italy, March 16–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-37074-8/pbk). Lecture Notes in Computer Science 7794, 50-64 (2013).
MSC:  68Q85
PDFBibTeX XMLCite
Full Text: DOI

Analysis of random walks using tabu lists. (English) Zbl 1503.05111

Even, Guy (ed.) et al., Structural information and communication complexity. 19th international colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30–July 2, 2012. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7355, 254-266 (2012).
MSC:  05C81 68R10
PDFBibTeX XMLCite
Full Text: DOI

Vote-independence: a powerful privacy notion for voting protocols. (English) Zbl 1302.94045

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 164-180 (2012).
MSC:  94A60 91B12
PDFBibTeX XMLCite
Full Text: DOI HAL

Automated verification of block cipher modes of operation, an improved method. (English) Zbl 1303.68051

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 23-31 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. (English) Zbl 1233.94003

Lecture Notes in Computer Science 6888. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). xiii, 253 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Benaloh’s dense probabilistic encryption revisited. (English) Zbl 1280.94055

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 348-362 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Automated proofs for asymmetric encryption. (English) Zbl 1274.94056

Dams, Dennis (ed.) et al., Concurrency, compositionality, and correctness. Essays in honor of Willem-Paul de Roever. Berlin: Springer (ISBN 978-3-642-11511-0/pbk). Lecture Notes in Computer Science 5930, 300-321 (2010).
MSC:  94A60 68P25 68Q60 68T15
PDFBibTeX XMLCite
Full Text: DOI HAL

Automated security proof for symmetric encryption modes. (English) Zbl 1273.68109

Datta, Anupam (ed.), Advances in computer science – ASIAN 2009. Information security and privacy. 13th Asian computing science conference, Seoul, Korea, December 14–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10621-7/pbk). Lecture Notes in Computer Science 5913, 39-53 (2009).
MSC:  68P25 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Comparing state spaces in automatic security protocol analysis. (English) Zbl 1242.94022

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 70-94 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Symbolic protocol analysis in presence of a homomorphism operator and exclusive or. (English) Zbl 1133.94315

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 132-143 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Intruder deduction for AC-like equational theories with homomorphisms. (English) Zbl 1078.68034

Giesl, Jürgen (ed.), Term rewriting and applications. 16th international conference, RTA 2005, Nara, Japan, April 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25596-6/pbk). Lecture Notes in Computer Science 3467, 308-322 (2005).
MSC:  68P25 68Q42 68Q85 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software