1 Introduction - Microsoft

Extrait du fichier (au format texte) :

One-Way Accumulators:
A Decentralized Alternative to Digital Signatures
(Extended Abstract)
Josh Benaloh
Clarkson University

Michael de Mare
Giordano Automation
Abstract

This paper describes a simple candidate one-way hash function which satis es a quasi-commutative property that allows it to be used as an accumulator. This property allows protocols to be developed in which the need for a trusted central authority can be eliminated. Space-e cient distributed protocols are given for document time stamping and for membership testing, and many other applications are possible.

1 Introduction
One-way hash functions are generally de ned as functions of a single argument which (in a di cult to invert" fashion) reduce their arguments to a pre-determined size. We view hash functions, somewhat di erently here, as functions which take two arguments from comparably sized domains and produce a result of similar size. In other words, a hash function is a function h with the property that h: A B ! C where jAj jB j jC j. There is, of course, no substantial di erence between this view and the traditional view except that this view allows us to de ne a special quasi-commutative property which, as it turns out,
has several applications.
The desired property is obtained by considering functions h: X Y ! X and asserting that for all x 2 X and for all y ; y 2 Y ,
h(h(x; y ); y ) = h(h(x; y ); y ):
This property is not at all unusual. Addition and multiplication modulo n both have this property as does exponentiation modulo n when written as en(x; y) = xy mod n. Of these,
only exponentiation modulo n has the additional property that (under suitable conditions),
the function is believed to be di cult to invert.
This paper will describe how to use the combination of these two properties (quasicommutativity and one-wayness) to develop a one-way accumulator which (among other applications) can be used to provide space-e cient cryptographic protocols for time stamping and membership testing.
1

2

1

2

2

1

1

2 De nitions

Les promotions

Promo
14.9 € 12.9 €


MSFT Echo Microsoft Surface Pro 11th Edition Fact Sheet
MSFT Echo Microsoft Surface Pro 11th Edition Fact Sheet
12/02/2026 - www.microsoft.com
Surface Pro for Business Pioneering versatility matched by intelligent power Unlock high performance in a form factor that redefines what a laptop can do. The brilliant display with touch and inking, combined with an adjustable kickstand make work comfortable in more places. Choose from Wi-Fi+5G or Wi-Fi only. Snapdragon? X Elite and Plus processors deliver speed and efficiency with CPUs and industry-defining NPU driving up to 45 TOPS for seamless on-device AI Adapts to changing workstyles Exceptional...

C dric FOURNET LE JOIN-CALCUL : UN CALCUL POUR ... - Microsoft
C dric FOURNET LE JOIN-CALCUL : UN CALCUL POUR ... - Microsoft
11/04/2018 - www.microsoft.com
TH SE pr sent e L' COLE POLYTECHNIQUE pour obtenir le titre de DOCTEUR DE L' COLE POLYTECHNIQUE sp cialit : INFORMATIQUE par C dric FOURNET Sujet de la th se : LE JOIN-CALCUL : UN CALCUL POUR LA PROGRAMMATION R PARTIE ET MOBILE The Join-Calculus: a Calculus for Distributed Mobile Programming Soutenue le 23 Novembre 1998 devant le jury compos de : MM. Robin Milner Roberto Amadio G rard Boudol Jean-Jacques L vy G rard Berry Luca Cardelli Georges Gonthier Pr sident Rapporteurs Directeur de th...

1 Introduction - Microsoft
1 Introduction - Microsoft
11/04/2018 - www.microsoft.com
One-Way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract) Josh Benaloh Clarkson University Michael de Mare Giordano Automation Abstract This paper describes a simple candidate one-way hash function which satis es a quasi-commutative property that allows it to be used as an accumulator. This property allows protocols to be developed in which the need for a trusted central authority can be eliminated. Space-e cient distributed protocols are given for document time...

User-Driven Access Control: Rethinking Permission ... - CiteSeerX
User-Driven Access Control: Rethinking Permission ... - CiteSeerX
23/08/2018 - www.microsoft.com
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yoshi}@cs.washington.edu University of Washington Alexander Moshchuk, Bryan Parno, Helen J. Wang {alexmos, parno, helenw}@microsoft.com Microsoft Research, Redmond Crispin Cowan crispin@microsoft.com Microsoft Abstract tionality and security for access to the user s data and resources. From a functionality standpoint, isolation inhibits the client-side manipulation...

L'économie de la sécurité - Microsoft
L'économie de la sécurité - Microsoft
16/11/2016 - www.microsoft.com
nl y se Lect L économie de la sécurité Ces dernières années, la sécurité est devenue une priorité pour les pouvoirs publics et les entreprises. Crime organisé, terrorisme, interruption des chaînes d approvisionnement mondiales, virus informatiques  autant de menaces avec lesquelles il faut compter dans le monde d aujourd hui. D où l émergence d un marché des équipements et des services de sécurité de 100 milliards de dollars. Ce marché est alimenté par la demande croissante émanant...

Microsoft Modern Work Plan Comparison Education 11 2021
Microsoft Modern Work Plan Comparison Education 11 2021
14/09/2024 - www.microsoft.com
Add-on licenses Endpoint and app management Microsoft Product Terms Desktop client apps1 %? %? %? %? %? Office Mobile apps2 %? %? %? %? %? %? Install apps on up to 5 PCs/Mac + 5 tablets + 5 smartphones %?3 %? %? %?3 %? %? Office for the web %? %?

Architectures reconfigurables et traitement de proble`mes ... - Microsoft
Architectures reconfigurables et traitement de proble`mes ... - Microsoft
16/11/2016 - www.microsoft.com
RECHERCHE Architectures reconfigurables et traitement de proble`mes NP-difficiles : un nouveau domaine d application Youssef Hamadi    David Merceron  '  ' LIRMM, UMR 5506 CNRS/Universite´ Montpellier II 161, Rue Ada, 34392 Montpellier Cedex 5 hamadi@lirmm.fr ''' EURIWARE, 12-14 rue du fort de St-Cyr 78067 St Quentin-en-Yvelines Cedex damercer@euriware.fr RE´SUME´. L algorithme GSAT est un algorithme de recherche locale. Cette me´thode recherche la premie`re instanciation...

Vers une approche simplifiée pour introduire le caractère ... - Microsoft
Vers une approche simplifiée pour introduire le caractère ... - Microsoft
23/11/2017 - www.microsoft.com
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/262881208 Vers une approche simplifiée pour introduire le caractère incrémental dans les systèmes de dialogue Conference Paper · July 2014 CITATION READS 1 26 3 authors, including: Hatim Khouzaimi Romain Laroche Orange Labs / Laboratoire Informatique d'Avi & Microsoft Maluuba 12 PUBLICATIONS 42 CITATIONS 58 PUBLICATIONS 185 CITATIONS SEE PROFILE All content following this page was uploaded by Hatim Khouzaimi on 28 April 2015. The user has requested enhancement of the downloaded file. SEE PROFILE 21ème...
 
 

Télécharger le PDF - Samsung
Télécharger le PDF - Samsung
21/11/2014 - www.samsung.com
Conditions générales d'achat Samsung Electronics Benelux B.V. 1. Définitions Dans ces conditions générales d'achat, les définitions suivantes s'appliquent: "Samsung" Samsung Electronics Benelux B.V., avec siège statutaire à Delft. "Fournisseur" Toute partie qui s'engage ou s'est engagée par Contrat avec Samsung, ainsi que toute partie qui livre ou a livré des marchandises et/ou des services à Samsung. "Contrat" Tout accord et/ou action (juridique) entre Samsung et le Fournisseur...

Legal Terms Ugc Guideline
Legal Terms Ugc Guideline
07/08/2024 - www.philips.com
Legal Terms TP Vision User Generated Content Terms of Use TP Vision Europe B.V. ( TP Vision ) reaches out to social media users to seek their permission to feature our favourite content on our various websites, social channels, and various promotional materials. You are reading this because TP Vision has requested your permission to use your social media content in this way. If you choose to allow us to use your social media content (including photos, text, graphics, audio, video, location information,...

beschreibung des trockners - Billiger.de
beschreibung des trockners - Billiger.de
20/03/2015 - docs.whirlpool.eu
1 2 INHALT BITTE LESEN SIE DIE GEBRAUCHSANWEISUNG DURCH! KURZANLEITUNG PROGRAMMÜBERSICHT VORBEREITEN DER WÄSCHE AUSWAHL DES PROGRAMMS UND DER ZUSATZFUNKTIONEN PROGRAMM STARTEN UND AUSFÜHREN PROGRAMM UMWÄHLEN UNTERBRECHEN EINES PROGRAMMS TÄGLICHE WARTUNG UND REINIGUNG GEBRAUCHSANWEISUNG INSTALLATION DES TROCKNERS Seite 4 SICHERHEITSHINWEISE UND ALLGEMEINE RATSCHLÄGE Seite 7 BESCHREIBUNG DES TROCKNERS Seite 10 HINWEIS - WARTUNG UND REINIGUNG Seite 10 PFLEGE UND REINIGUNG DES...

Quick Start Guide - Jbl
Quick Start Guide - Jbl
13/04/2017 - fr.jbl.com
ARE YOU A FAN? TRY THESE TOP-SELLING ITEMS FROM YURBUDS WE D LOVE TO HEAR YOUR THOUGHTS! ÊTES-VOUS ENTHOUSIASTE? ARTICLES LES PLUS VENDUS DE YURBUDS. SIGNATURE SERIES ITX-3000 FOCUS 400 LIBERTY WIRELESS 3-BUTTON COMMAND BLUETOOTH COMPATIBILITY COMPLETE A SHORT SURVEY AND RECEIVE OFF YOUR NEXT PURCHASE. VISIT YURBUDS.COM/SURVEYNOW REFLECTIVE WOVEN CORDS Tangle and Tear Resistant CORDONS EN TISSU RÉFLÉCHISSANT Anti-enchevêtrement et déchirure CONNECT WITH US. CONNECTEZ-VOUS...

Imprimer via la fonction NFC Présentation ... - TA Triumph-Adler
Imprimer via la fonction NFC Présentation ... - TA Triumph-Adler
06/06/2018 - www.triumph-adler.fr
TAF16/1014 24/10/2016 Objet : Imprimer via la fonction NFC Modèles compatibles : TA Color 2506ci, 3206ci, 4006ci, 5006ci, 6006ci, TA 4056i, 5056i, 6056i Présentation / positionnement La NFC, ou Near Field Communication (Communication dans un champ proche), est une technologie simple et intuitive qui vous permet d'utiliser votre téléphone portable pour vous connecter au MFP TA Triumph-Adler et imprimer vos documents. Cette action implique le placement de votre Smartphone (ou tout autre appareil...

Installation Guide
Installation Guide
16/02/2012 - www.logitech.com
3 Installation Guide 1 4 2 1 OFF E Mail Volume E Mail Volume F1 Esc F2 @ ! F3 F5 % 4 3 F6 F8 F9 F10