Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,294 papers from all fields of science
Search
Sign In
Create Free Account
Dining cryptographers problem
Known as:
Dining cryptographer
, DC-Net
, Dining cryptographer protocol
Expand
In cryptography, the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-OR function. David Chaum…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Anonymous veto network
Cryptographic hash function
Diffie–Hellman key exchange
Dining philosophers problem
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Storage Optimization for Non Interactive Dining Cryptographers (NIDC)
Pablo García
,
J. V. D. Graaf
,
G. Montejano
,
D. Riesco
,
N. Debnath
,
Silvia Bast
International Conference on Information…
2015
Corpus ID: 41161845
In many applications, such as e-voting, it is imperative that the privacy scope unconditional security levels, i.e. that it is…
Expand
2014
2014
Beating the Birthday Paradox in Dining Cryptographer Networks
Pablo García
,
J. V. D. Graaf
,
A. Hevia
,
Alfredo Viola
International Conference on Cryptology and…
2014
Corpus ID: 33796631
A Dining Cryptographer Network (DC-Net) allows multiple players to broadcast messages without disclosing the identity of the…
Expand
2014
2014
Implementación de canales paralelos en un protocolo Non Interactive Dining Cryptographers
Pablo García
,
Jeroen van de Graaf
,
G. A. Montejano
,
Silvia Gabriela Bast
,
O. Testa
2014
Corpus ID: 190696108
1 Departamento de Matematica Universidad Nacional de La Pampa Av. Uruguay 151(6300) Santa Rosa La Pampa Argentina {pablogarcia…
Expand
2014
2014
Automatically Calculating Quantitative Integrity Measures for Imperative Programs
Tom Chothia
,
Chris Novakovic
,
R. Singh
DPM/SETOP/QASA
2014
Corpus ID: 15399961
This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. We…
Expand
2014
2014
Dining Cryptographers are Practical (preliminary version)
Christian Franck
,
J. V. D. Graaf
arXiv.org
2014
Corpus ID: 17399477
The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the…
Expand
2013
2013
Modularity and Openness in Modeling Multi-Agent Systems
W. Jamroga
,
Artur Meski
,
M. Szreter
International Symposium on Games, Automata…
2013
Corpus ID: 17727379
We revisit the formalism of modular interpreted systems (MIS) which encourages modular and open modeling of synchronous multi…
Expand
2013
2013
Manejo de colisiones en un protocolo Non Interactive Dining Cryptographers
Jeroen van de Graaf
,
G. A. Montejano
,
Pablo García
2013
Corpus ID: 194720052
1 Departamento de Ciência da Computação Universidade Federal de Minas Gerais Av. Antonio Carlos, 6627 – 31270-010 Belo Horizonte…
Expand
2010
2010
Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution
Xiangliang Zhang
,
Wei Wang
International Conference on Advanced Data Mining…
2010
Corpus ID: 14617872
Non-stationary distribution, in which the data distribution evolves over time, is a common issue in many application fields, e.g…
Expand
2007
2007
Dining Cryptographers The Protocol
Immanuel Scholz
2007
Corpus ID: 52060421
What are dining cryptographer networks? How and why do they work? And why is there still no real implementation available? Back…
Expand
2007
2007
Acimn protocol: A protocol for anonymous communication in multi hop wireless networks
Volker Fusenig
,
D. Spiewak
,
T. Engel
Wireless Telecommunications Symposium
2007
Corpus ID: 14439035
Summary form only given. Anonymity is the state of not being identifiable within a set of subjects. Different strategies exist…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE