[ACM Press the 14th ACM conference - Ale
β
Halderman, J. Alex; Waters, Brent
π
Article
π
2007
π
ACM Press
β 585 KB
Several important security protocols require parties to perform computations based on random challenges. Traditionally, proving that the challenges were randomly chosen has required interactive communication among the parties or the existence of a trusted server. We offer an alternative solution whe