Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 4 of 4.

Add to Quick Collection   All 4 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/117602
Description: We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately ... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/46655
Description: A secret sharing scheme typically requires secure communications in each of two distribution phases: (1) a dealer distributes shares to participants (share distribution phase); and later (2) the parti ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2004
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/20656
Description: In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudorandom function f (⋅) among n players in such a way that for all the inputs x, any u players can compute f (x) while ... More
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/118537
Description: The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimula ... More
  • First
  • Previous
  • 1
  • Next
  • Last