Sciweavers

163 search results - page 6 / 33
» Computationally Convincing Proofs of Knowledge
Sort
View
STOC
2002
ACM
80views Algorithms» more  STOC 2002»
14 years 8 months ago
Strict polynomial-time in simulation and extraction
The notion of efficient computation is usually identified in cryptography and complexity with (strict) probabilistic polynomial time. However, until recently, in order to obtain c...
Boaz Barak, Yehuda Lindell
IACR
2011
147views more  IACR 2011»
12 years 7 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 1 months ago
Parallel Repetition of Computationally Sound Protocols Revisited
Abstract. Parallel repetition is well known to reduce the error probability at an exponential rate for single- and multi-prover interactive proofs. Bellare, Impagliazzo and Naor (1...
Krzysztof Pietrzak, Douglas Wikström
LPAR
2004
Springer
14 years 29 days ago
Knowledge-Based Synthesis of Distributed Systems Using Event Structures
Abstract. To produce a program guaranteed to satisfy a given specification one can synthesize it from a formal constructive proof that a computation satisfying that specification...
Mark Bickford, Robert L. Constable, Joseph Y. Halp...
ICA
2007
Springer
14 years 1 months ago
Is the General Form of Renyi's Entropy a Contrast for Source Separation?
Abstract. Renyi’s entropy-based criterion has been proposed as an objective function for independent component analysis because of its relationship with Shannon’s entropy and i...
Frédéric Vrins, Dinh-Tuan Pham, Mich...