Sciweavers

135 search results - page 14 / 27
» Formal Indistinguishability Extended to the Random Oracle Mo...
Sort
View
FOCS
2006
IEEE
14 years 1 months ago
Fast Algorithms for Logconcave Functions: Sampling, Rounding, Integration and Optimization
We prove that the hit-and-run random walk is rapidly mixing for an arbitrary logconcave distribution starting from any point in the support. This extends the work of [26], where t...
László Lovász, Santosh Vempal...
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 1 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
MST
2006
81views more  MST 2006»
13 years 7 months ago
Local Limit Properties for Pattern Statistics and Rational Models
Motivated by problems of pattern statistics, we study the limit distribution of the random variable counting the number of occurrences of the symbol a in a word of length n chosen...
Alberto Bertoni, Christian Choffrut, Massimiliano ...
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
14 years 28 days ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
ISPA
2005
Springer
14 years 1 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng