Sciweavers

8972 search results - page 43 / 1795
» Private Information Retrieval
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 5 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ACISP
2009
Springer
15 years 5 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 5 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 1 days ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer
LREC
2008
137views Education» more  LREC 2008»
15 years 11 days ago
Combining Multiple Models for Speech Information Retrieval
In this article we present a method for combining different information retrieval models in order to increase the retrieval performance in a Speech Information Retrieval task. The...
Muath Alzghool, Diana Inkpen