Research in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26
نویسندگان
چکیده
This project encompasses a broad range of topics in the security, complexity, and algorithms areas of mutual interest to researchers in LCS and NTT. Particular focus is on developing electronic voting protocols; developing routing protocols and algorithms for high speed networks; developing protocols to protect intellectual property that is transmitted through the network; developing very fast error-correction coding and decoding algorithms; and developing efficient algorithms on quantum computers.
منابع مشابه
9807 - 12 & 26 Research in Cryptography , Information Security and Algorithm Development
It is perhaps important to mention at this point that while the concrete research directions proposed below are firm ones, we may also wish to use NTT support to explore related directions not mentioned here. In particular, we note that there are likely to be several new graduate students in our group next year, and their precise research directions are as usual subject to negotiation and creat...
متن کاملResearch in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress Report : January 1 , 2000 — June 30 , 2000
In previous work, Professor Rivest has proposed a new scheme for achieving information-theoretically secure commitments when both parties are computationally unbounded. The value committed to by Alice is informationtheoretically concealed from Bob (until revealed), but Alice can only change the value committed to with negligible probability. The scheme utilizes both a trusted third party and pr...
متن کاملResearch in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress Report
Professor Goldwasser, together with Barak, Goldreich, and Lindell worked on Resettably-sound proofs and arguments. These concept was previously investigated by Reyzin and Micali in the public-key setting. These protocols maintain soundness even when the prover can reset the verifier to use the same random coins in repeated executions of the protocol. In the current work it is shown that resetta...
متن کاملResearch in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress
An intriguing question brought up by the presence of the Internet, is how to identify whether different texts were generated by the same person. This question of author attribution, of course is not new, and linguists have long debated of whether famous bodies of literature were written by Shakespeare or many authors (to name one such debate). However, with the onset of the Internet we both hav...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کامل