Sciweavers

325 search results - page 59 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
ASIACRYPT
2006
Springer
14 years 14 days ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
MOBISYS
2003
ACM
14 years 8 months ago
Collaboration and Multimedia Authoring on Mobile Devices
This paper introduces adaptation-aware editing and progressive update propagation, two novel mechanisms that enable authoring multimedia content and collaborative work on mobile d...
Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy...
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
14 years 3 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
ICPR
2006
IEEE
14 years 9 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...