Theory of Cryptography Library: 1998 Records
This web page provides access to recent work on Theory of Cryptography.
Work has been placed here by the authors and did not undergo any
refereeing process other than verifying that the work seems to be
within scope and of some interest to the subscribers.
- 96-00:
O. Goldreich, An Example of a Library Record,
[Abstract]
[full paper (rev.)]
- 98-01:
G. Bleumer, On Protocol Divertibility, January 1998.
[Abstract]
[full paper]
- 98-02:
A. De Santis, G. Di Crescenzo, O. Goldreich, and G. Persiano,
The Graph Clustering Problem has a Perfect Zero-Knowledge Proof,
January 1998.
[Abstract]
[full paper]
- 98-03:
B. Chor, N. Gilboa, and M. Naor,
Private Information Retrieval by Keywords, February 1998.
[Abstract]
[full paper]
- 98-04:
G. Di-Crescenzo, Y. Ishai and R. Ostrovsky,
Universal Service Providers for Database Private Information Retrieval,
February 1998.
[Abstract]
[full paper]
- 98-05:
O. Goldreich and S. Goldwasser, On the possibility of basing Cryptography
on the assumption that $P \neq NP$, February 1998.
[Abstract]
[full paper]
- 98-06:
R. Cramer and V. Shoup, A Practical Public Key Cryptosystem Provably
Secure against Adaptive Chosen Ciphertext Attack, March 1998.
[Abstract]
[full paper]
- 98-07:
M. Bellare, J. A. Garay and T. Rabin,
Fast Batch Verification for Modular Exponentiation and Digital Signatures
March 1998.
[Abstract]
[full paper]
- 98-08:
R. Gennaro, D. Micciancio and T. Rabin,
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System
for Quasi-Safe Prime Products, March 1998.
[Abstract]
[full paper]
- 98-09:
M. Bellare, R. Canetti, and H. Krawczyk
A Modular Approach to the Design and Analysis of Authentication
and Key Exchange Protocols, March 1998.
[Abstract]
[full paper]
- 98-10:
H. Krawczyk and T. Rabin,
Chameleon Hashing and Signatures, March 1998.
[Abstract]
[full paper]
- 98-11:
R. Canetti, O. Goldreich, and S. Halevi,
The Random Oracle Methodology, Revisited, March 1998.
[Abstract]
[full paper]
- 98-12:
R. Canetti, S. Halevi, and A. Herzberg
Maintaining Authenticated Communication in the Presence of Break-ins,
April 1998.
[Abstract]
[full paper]
- 98-13:
Y. Gertner, S. Goldwasser, T. Malkin,
A Random Server Model for Private Information Retrieval
(or How to Achieve Information Theoretic PIR Avoiding Data Replication),
April 1998.
[Abstract]
[full paper]
- 98-14:
R. Canetti, E. Kushilevitz, R. Ostrovsky, A. Rosen,
Randomness versus Fault-Tolerance, April 1998.
[Abstract]
[full paper]
- 98-15:
S. Halevi and S. Micali,
More on Proofs of Knowledge, May 1998.
[Abstract]
[full paper]
- 98-16:
Hoi-Kwong Lo and H. F. Chau,
Quantum Computers Render Quantum Key Distribution
Unconditionally Secure Over Arbitrarily Long Distances, May 1998.
[Abstract]
[full paper]
- 98-17:
H. F. Chau and H.-K. Lo,
Making An Empty Promise With A Quantum Computer
(Or, A Brief Review on the Impossibility of Quantum Bit Commitment),
May 1998.
[Abstract]
[full paper]
- 98-18:
R. Canetti,
Security and Composition of Multi-party Cryptographic Protocols,
June 1998.
[Abstract]
[full paper]
...
- 98-xx:
authors, title, month.
[Abstract]
[full paper]
The library's resides on the web server of
the Theory of Computation Group
at the Laboratory for Computer Science
of MIT.
The library is currently maintained by
Oded Goldreich.
Back to the library's main page
or to the library's Archive.