Sciweavers

793 search results - page 96 / 159
» Argumentation and standards of proof
Sort
View
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
15 years 4 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
128
Voted
CCS
2010
ACM
15 years 26 days ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...
72
Voted
IVC
2007
84views more  IVC 2007»
15 years 17 days ago
A variation on SVD based image compression
We present a variation to the well studied SVD based image compression technique. Our variation can be viewed as a preprocessing step in which the input image is permuted as per a...
Abhiram G. Ranade, Srikanth S. Mahabalarao, Satyen...
ESORICS
2005
Springer
15 years 6 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
16 years 29 days ago
The PCP theorem by gap amplification
The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only a constant number of bits from the proof. The cele...
Irit Dinur