You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 1, Issue 2

September 2017 - 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Article
  • Open Access
52 Citations
29,547 Views
31 Pages

After more than eight years since the launch of Bitcoin, the decentralized transaction ledger functionality implemented through the blockchain technology is being used not only for cryptocurrencies, but to register, confirm and transfer any kind of c...

  • Article
  • Open Access
1 Citations
8,490 Views
17 Pages

In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. Using those constraints, we consider a relativistic bit commitment scheme introduced by Lunghi et al. This prot...

  • Article
  • Open Access
8 Citations
13,926 Views
29 Pages

Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifia...

  • Article
  • Open Access
43 Citations
11,098 Views
20 Pages

Multiparty Delegated Quantum Computing

  • Elham Kashefi and
  • Anna Pappa

Quantum computing has seen tremendous progress in the past few years. However, due to limitations in the scalability of quantum technologies, it seems that we are far from constructing universal quantum computers for everyday users. A more feasible s...

  • Article
  • Open Access
8 Citations
8,681 Views
16 Pages

Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics,...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X