Sciweavers

6 search results - page 1 / 2
» Efficient Lattice (H)IBE in the Standard Model
Sort
View
EUROCRYPT
2010
Springer
13 years 7 months ago
Efficient Lattice (H)IBE in the Standard Model
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
Shweta Agrawal, Dan Boneh, Xavier Boyen
TIT
2002
126views more  TIT 2002»
13 years 4 months ago
Two-dimensional interleaving schemes with repetitions: Constructions and bounds
Abstract--Two-dimensional interleaving schemes with repetitions are considered. These schemes are required for the correction of two-dimensional bursts (or clusters) of errors in a...
Tuvi Etzion, Alexander Vardy
WSC
2004
13 years 5 months ago
Simulation-Based Pricing of Mortgage-Backed Securities
Mortgage-Backed-Securities (MBS), as the largest investment class of fixed income securities, have always been hard to price. Because of the following reasons, normal numerical me...
Jian Chen
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
13 years 7 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
IHI
2010
197views Healthcare» more  IHI 2010»
12 years 11 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...