One of the most useful methods for studying the stable homotopy category is localising at some spectrum E. For an arbitrary stable model category we introduce a candidate for the E...
: The concepts of fitness and subfitness (as defined in Isbell [9]) are useful separation properties in point-free topology. The categorical behaviour of subfitness is bad and ...
We characterize those varieties of universal algebras where every split epimorphism considered as a map of sets is a product projection. In addition we obtain new characterization...
Enabling private database queries is an important and challenging research problem with many real-world applications. The goal is for the client to obtain the results of its queri...
Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mar...
Traditional user authentication methods using passcode or finger movement on smartphones are vulnerable to shoulder surfing attack, smudge attack, and keylogger attack. These att...
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-resistant chameleon hash scheme (CH) and a CCA encryption scheme accepting a smoo...
There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such dev...
Proactive secret sharing (PSS) schemes are designed for settings where long-term confidentiality of secrets has to be guaranteed, specifically, when all participating parties ma...
Joshua Baron, Karim El Defrawy, Joshua Lampkins, R...