Sciweavers

978 search results - page 36 / 196
» Knowledge, Probability, and Adversaries
Sort
View
CN
2010
103views more  CN 2010»
14 years 12 months ago
Anti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...
IACR
2011
134views more  IACR 2011»
13 years 11 months ago
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases
Zero knowledge sets (ZKS) [18] allow a party to commit to a secret set S and then to, non interactively, produce proofs for statements such as x ∈ S or x /∈ S. As recognized in...
Dario Catalano, Dario Fiore
BCB
2010
140views Bioinformatics» more  BCB 2010»
14 years 7 months ago
Guiding belief propagation using domain knowledge for protein-structure determination
A major bottleneck in high-throughput protein crystallography is producing protein-structure models from an electrondensity map. In previous work, we developed Acmi, a probabilist...
Ameet Soni, Craig A. Bingman, Jude W. Shavlik
ICALP
2010
Springer
15 years 4 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 3 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache