Searched for: subject%3A%22two%255C-party%255C+cryptography%22
(1 - 2 of 2)
document
Ribeiro, J.D. (author)
Most of themainstream cryptographic protocols that are used today rely on the assumption that the adversary has limited computational power, and that a given set of mathematical problems is hard to solve (on average), i.e. that there is no polynomial time algorithm that solves these problems. While these assumptions are reasonable for now they...
doctoral thesis 2020
document
Kaniewski, J. (author), Wehner, S.D.C. (author)
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the...
journal article 2016