Sciweavers

402 search results - page 38 / 81
» Cryptosystems using Linear Groups
Sort
View
EOR
2002
73views more  EOR 2002»
14 years 9 months ago
Stochastic conditional and unconditional warfare
This article constructs a foundation for warfare at the individual level, where agents in two groups fire and absorb shots according to a non-stationary Poisson process. We determ...
Kjell Hausken, John F. Moxnes
FOCS
1994
IEEE
15 years 2 months ago
A Spectral Approach to Lower Bounds
We establish a nonlinear lower bound for halfplane range searching over a group. Specifically, we show that summing up the weights of n (weighted) points within n halfplanes requir...
Bernard Chazelle
CCS
2008
ACM
14 years 12 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
JAMIA
2011
68views more  JAMIA 2011»
14 years 26 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...