Dining cryptographers problem

Results: 17



#Item
1Computing / Internet / Cryptography / Anonymity / Dark web / Anonymous remailer / Email / Pseudonymity / Internet privacy / Tor / Dining cryptographers problem

Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-01-20 15:00:46
2Cryptography / Dining cryptographers problem / Secure multi-party computation / Secret sharing / Verifiable secret sharing / Public-key cryptography / Cryptographic protocol / Blob / David Chaum

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16
3Secure communication / Cryptography / Onion routing / Routing / Internet privacy / Crypto-anarchism / Tor / Mix network / Dining cryptographers problem / Anonymity / Len Sassaman

Design and Analysis of Efficient Anonymous-Communication Protocols

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-07 16:37:34
4Graph theory / Cryptography / Dining cryptographers problem / Vertex / Public-key cryptography / Graph / Connected component / Data Encryption Standard

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
5Cryptography / Computing / Dining cryptographers problem / Public-key cryptography / Crowds / Communications protocol / Anonymity / Tor

Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

Add to Reading List

Source URL: ohmygodel.com

Language: English - Date: 2014-08-17 14:48:08
6Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-06-25 13:47:28
7Cryptography / Cross-platform software / Dark web / Secure communication / Internet privacy / Dining cryptographers problem / I2P / Clientserver model / Internet Relay Chat / Freenet / Mix network / Peer-to-peer

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-03-13 12:26:53
8Cryptography / Computing / Secure communication / Software / Cryptographic software / Internet privacy / Crypto-anarchism / Anonymity / Dining cryptographers problem / Public-key cryptography / K-anonymity / Mix network

On the Effectiveness of k -Anonymity Against Traffic Analysis and Surveillance Nicholas Hopper, Eugene Y. Vasserman University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-10 13:39:42
9Cryptography / Public-key cryptography / Electronic documents / Dining cryptographers problem / Communications protocol / Crowds / Email / Group signature / Anonymity / Anonymous remailer / Digital signature

Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-27 09:31:40
10RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
UPDATE