Cryptography miracles, secure auctions, matching problem verification
نویسندگان
چکیده
منابع مشابه
Secure Auctions without Cryptography
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on complex cryptographic operations to ensure manifold security properties such as bidder-anonymity or bid-privacy, non-repudiation, fairness or public verifiability of the result. This makes them difficult to understand for users who are not experts in cryptography. We propose two physical auction proto...
متن کاملAuthentication using Secure Node Signature Verification Algorithm with Quantum Cryptography
In now a days, most of the communication takes place through Internet. Most of the users are used to transmit their information through insecure channels that are interconnected throughout world. Thus, security must be provided to achieve confidentiality, access control, integrity and authentication. To ensure all these services, various cryptography and steganography techniques like RSA, AES, ...
متن کاملSecure Online English Auctions
Security and privacy in online auctions is a major concern as auction participants have many opportunities to cheat (e.g., repudiate bids, not deliver items, etc.). Online auctions such as those used by eBay are based on a type of auction referred to as an English auction. Dispite the English auction being the most popular type of auction, it has received less security coverage than other types...
متن کاملAbsolutely Secure Classical Cryptography
Fundamental problem of cryptography is to create more absolutely secure bits than the initially shared secret bits between two legitimate users. It is widely believed that this task can only be accomplished by quantum cryptosystems. We present a simple classical cryptosystem, which can fulfill this objective.
متن کاملCompletely secure practical cryptography
Cryptography the art of secure communications, has been developed at least over 2500 years. Still at present, no perfectly secure as well as practically suitable classical or quantum cryptosystems exist. Statistically encoding the individual bit, here we present a practical key distribution technique which is absolutely secure both for classical and quantum keys. To achieve perfect security, no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2014
ISSN: 0001-0782,1557-7317
DOI: 10.1145/2574871