Sciweavers

915 search results - page 30 / 183
» Proof labeling schemes
Sort
View
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 5 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
ASIACRYPT
2004
Springer
15 years 5 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
ICASSP
2011
IEEE
14 years 3 months ago
Learning a discriminative visual codebook using homonym scheme
This paper studies a method for learning a discriminative visual codebook for various computer vision tasks such as image categorization and object recognition. The performance of...
SeungRyul Baek, Chang D. Yoo, Sungrack Yun
ASIACRYPT
2006
Springer
15 years 3 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
CIKM
2007
Springer
15 years 5 months ago
A novel scheme for domain-transfer problem in the context of sentiment analysis
In this work, we attempt to tackle domain-transfer problem by combining old-domain labeled examples with new-domain unlabeled ones. The basic idea is to use old-domain-trained cla...
Songbo Tan, Gaowei Wu, Huifeng Tang, Xueqi Cheng