Sciweavers

4 search results - page 1 / 1
» An Omega(n^{1 3}) Lower Bound for Bilinear Group Based Priva...
Sort
View
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
EUROCRYPT
2010
Springer
13 years 9 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ACL
2001
13 years 6 months ago
Mapping Lexical Entries in a Verbs Database to WordNet Senses
This paper describes automatic techniques for mapping 9611 entries in a database of English verbs to WordNet senses. The verbs were initially grouped into 491 classes based on syn...
Rebecca Green, Lisa Pearl, Bonnie J. Dorr, Philip ...