Sciweavers

915 search results - page 64 / 183
» Proof labeling schemes
Sort
View
LREC
2008
145views Education» more  LREC 2008»
15 years 26 days ago
Annotating Superlatives
This paper describes a three-part annotation scheme for superlatives: The first identifies syntactic classes, since superlatives can serve different semantic purposes. The second ...
Silke Scheible
EUROCRYPT
2004
Springer
15 years 4 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
ICISC
2004
96views Cryptology» more  ICISC 2004»
15 years 25 days ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 24 days ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
INFOCOM
2009
IEEE
15 years 6 months ago
Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture
—A novel counter architecture, called Counter Braids, has recently been proposed for accurate per-flow measurement on high-speed links. Inspired by sparse random graph codes, Co...
Yi Lu, Balaji Prabhakar