Sciweavers

165 search results - page 3 / 33
» Cryptographic Complexity Classes and Computational Intractab...
Sort
View
ACSC
2005
IEEE
13 years 11 months ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras
ACL
2010
13 years 3 months ago
Complexity Assumptions in Ontology Verbalisation
We describe the strategy currently pursued for verbalising OWL ontologies by sentences in Controlled Natural Language (i.e., combining generic rules for realising logical patterns...
Richard Power
AUTOMATICA
1999
62views more  AUTOMATICA 1999»
13 years 5 months ago
Complexity of stability and controllability of elementary hybrid systems
In this paper, we consider simple classes of nonlinear systems and prove that basic questions related to their stability and controllability are either undecidable or computationa...
Vincent D. Blondel, John N. Tsitsiklis
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
11 years 7 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
ACISP
2001
Springer
13 years 9 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito