Sciweavers

199 search results - page 24 / 40
» Adaptive Proofs of Knowledge in the Random Oracle Model
Sort
View
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 2 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ADHOC
2007
115views more  ADHOC 2007»
14 years 11 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran
ACNS
2005
Springer
84views Cryptology» more  ACNS 2005»
15 years 4 months ago
Non-interactive Zero-Knowledge Arguments for Voting
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends it in to the authorities that tally the votes. If voters can send in arbitrary ...
Jens Groth
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 3 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
ICML
2000
IEEE
15 years 3 months ago
Using Knowledge to Speed Learning: A Comparison of Knowledge-based Cascade-correlation and Multi-task Learning
Cognitive modeling with neural networks unrealistically ignores the role of knowledge in learning by starting from random weights. It is likely that effective use of knowledge by ...
Thomas R. Shultz, François Rivest