Sciweavers

978 search results - page 36 / 196
» Knowledge, Probability, and Adversaries
Sort
View
CN
2010
103views more  CN 2010»
14 years 10 months ago
Anti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...
IACR
2011
134views more  IACR 2011»
13 years 9 months ago
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases
Zero knowledge sets (ZKS) [18] allow a party to commit to a secret set S and then to, non interactively, produce proofs for statements such as x ∈ S or x /∈ S. As recognized in...
Dario Catalano, Dario Fiore
BCB
2010
140views Bioinformatics» more  BCB 2010»
14 years 4 months ago
Guiding belief propagation using domain knowledge for protein-structure determination
A major bottleneck in high-throughput protein crystallography is producing protein-structure models from an electrondensity map. In previous work, we developed Acmi, a probabilist...
Ameet Soni, Craig A. Bingman, Jude W. Shavlik
ICALP
2010
Springer
15 years 2 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 1 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache