Research in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress Report : January 1 , 2000 — June 30 , 2000

نویسندگان

  • Shafi Goldwasser
  • Ronald L. Rivest
  • Mike Sipser
چکیده

In previous work, Professor Rivest has proposed a new scheme for achieving information-theoretically secure commitments when both parties are computationally unbounded. The value committed to by Alice is informationtheoretically concealed from Bob (until revealed), but Alice can only change the value committed to with negligible probability. The scheme utilizes both a trusted third party and private channels between all pairs of parties to achieve this result (without some such extensions, the result was known to be unachievable).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

9807 - 12 & 26 Research in Cryptography , Information Security and Algorithm Development

It is perhaps important to mention at this point that while the concrete research directions proposed below are firm ones, we may also wish to use NTT support to explore related directions not mentioned here. In particular, we note that there are likely to be several new graduate students in our group next year, and their precise research directions are as usual subject to negotiation and creat...

متن کامل

Research in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress

An intriguing question brought up by the presence of the Internet, is how to identify whether different texts were generated by the same person. This question of author attribution, of course is not new, and linguists have long debated of whether famous bodies of literature were written by Shakespeare or many authors (to name one such debate). However, with the onset of the Internet we both hav...

متن کامل

Research in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26 Progress Report

Professor Goldwasser, together with Barak, Goldreich, and Lindell worked on Resettably-sound proofs and arguments. These concept was previously investigated by Reyzin and Micali in the public-key setting. These protocols maintain soundness even when the prover can reset the verifier to use the same random coins in repeated executions of the protocol. In the current work it is shown that resetta...

متن کامل

Image Database Retrieval 9807 - NTT 03 Final Progress Report : June 30 , 2000

In this research project we created systems that can scan images and video to locate items of interest. For example, such a system should be able to scan a travel documentary for images of distinct locations and objects, like ``Buddhist temples'', ``gothic cathedrals'', or ``statues on horseback''. We believe that by leveraging our existing work in this area, we can play a key role in setting t...

متن کامل

Research in Cryptography , Information Security and Algorithm Development 9807 - 12 & 26

This project encompasses a broad range of topics in the security, complexity, and algorithms areas of mutual interest to researchers in LCS and NTT. Particular focus is on developing electronic voting protocols; developing routing protocols and algorithms for high speed networks; developing protocols to protect intellectual property that is transmitted through the network; developing very fast ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000