Skip to search formSkip to main contentSkip to account menu

Dining cryptographers problem

Known as: Dining cryptographer, DC-Net, Dining cryptographer protocol 
In cryptography, the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-OR function. David Chaum… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In many applications, such as e-voting, it is imperative that the privacy scope unconditional security levels, i.e. that it is… 
2014
2014
A Dining Cryptographer Network (DC-Net) allows multiple players to broadcast messages without disclosing the identity of the… 
2014
2014
1 Departamento de Matematica Universidad Nacional de La Pampa Av. Uruguay 151(6300) Santa Rosa La Pampa Argentina {pablogarcia… 
2014
2014
This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. We… 
2014
2014
The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the… 
2013
2013
We revisit the formalism of modular interpreted systems (MIS) which encourages modular and open modeling of synchronous multi… 
2013
2013
1 Departamento de Ciência da Computação Universidade Federal de Minas Gerais Av. Antonio Carlos, 6627 – 31270-010 Belo Horizonte… 
2010
2010
Non-stationary distribution, in which the data distribution evolves over time, is a common issue in many application fields, e.g… 
2007
2007
What are dining cryptographer networks? How and why do they work? And why is there still no real implementation available? Back… 
2007
2007
Summary form only given. Anonymity is the state of not being identifiable within a set of subjects. Different strategies exist…