Sciweavers

234 search results - page 23 / 47
» Proof Nets and the Identity of Proofs
Sort
View
IACR
2011
98views more  IACR 2011»
13 years 9 months ago
New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm
The contribution of this paper is twofold. First we present a new simple electronic voting scheme having standard re-encryption mix net back-end, which allows to cast a ballot and ...
Aram Jivanyan, Gurgen Khachatryan
TCC
2009
Springer
123views Cryptology» more  TCC 2009»
15 years 10 months ago
Hierarchical Identity Based Encryption with Polynomially Many Levels
We present the first hierarchical identity based encryption (HIBE) system that has full security for more than a constant number of levels. In all prior HIBE systems in the literat...
Craig Gentry, Shai Halevi
149
Voted
SRDS
2010
IEEE
14 years 8 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
15 years 4 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
97
Voted
ICTAI
2007
IEEE
15 years 4 months ago
CompoNet: Programmatically Embedding Neural Networks into AI Applications as Software Components
The provision of embedding neural networks into software applications can enable variety of Artificial Intelligence systems for individual users as well as organizations. Previous...
Uzair Ahmad, Andrey Gavrilov, Sungyoung Lee, Young...