Skip to Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 1, Issue 2

2017 September - 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Article
  • Open Access
53 Citations
29,898 Views
31 Pages

After more than eight years since the launch of Bitcoin, the decentralized transaction ledger functionality implemented through the blockchain technology is being used not only for cryptocurrencies, but to register, confirm and transfer any kind of c...

  • Article
  • Open Access
1 Citations
8,548 Views
17 Pages

In this paper, we study relativistic bit commitment, which uses timing and location constraints to achieve information theoretic security. Using those constraints, we consider a relativistic bit commitment scheme introduced by Lunghi et al. This prot...

  • Article
  • Open Access
8 Citations
14,577 Views
29 Pages

Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifia...

  • Article
  • Open Access
45 Citations
11,243 Views
20 Pages

Multiparty Delegated Quantum Computing

  • Elham Kashefi and
  • Anna Pappa

Quantum computing has seen tremendous progress in the past few years. However, due to limitations in the scalability of quantum technologies, it seems that we are far from constructing universal quantum computers for everyday users. A more feasible s...

  • Article
  • Open Access
8 Citations
8,758 Views
16 Pages

Die-rolling is the cryptographic task where two mistrustful, remote parties wish to generate a random D-sided die-roll over a communication channel. Optimal quantum protocols for this task have been given by Aharon and Silman (New Journal of Physics,...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X