Open Access
February, 1993 Probabilistic Algorithms for Defeating Adversaries
Joan Feigenbaum
Statist. Sci. 8(1): 26-30 (February, 1993). DOI: 10.1214/ss/1177011080

Abstract

Randomization appears to be an essential ingredient in algorithms for maintaining some form of privacy. This article discusses probabilistic algorithms for authenticating a user and for allowing the private use of shared resources.

Citation

Download Citation

Joan Feigenbaum. "Probabilistic Algorithms for Defeating Adversaries." Statist. Sci. 8 (1) 26 - 30, February, 1993. https://doi.org/10.1214/ss/1177011080

Information

Published: February, 1993
First available in Project Euclid: 19 April 2007

zbMATH: 0766.68060
MathSciNet: MR1194440
Digital Object Identifier: 10.1214/ss/1177011080

Keywords: Authentication , instance hiding , private computation , zero-knowledge

Rights: Copyright © 1993 Institute of Mathematical Statistics

Vol.8 • No. 1 • February, 1993
Back to Top