Sciweavers

612 search results - page 45 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
GI
2004
Springer
14 years 1 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
FOCS
2002
IEEE
14 years 25 days ago
Concurrent Zero Knowledge with Logarithmic Round-Complexity
We show that every language in NP has a (black-box) concurrent zero-knowledge proof system using ËœO(log n) rounds of interaction. The number of rounds in our protocol is optimal,...
Manoj Prabhakaran, Alon Rosen, Amit Sahai
CSR
2010
Springer
14 years 20 days ago
Frameworks for Logically Classifying Polynomial-Time Optimisation Problems
We show that a logical framework, based around a fragment of existential second-order logic formerly proposed by others so as to capture the class of polynomially-bounded P-optimi...
James Gate, Iain A. Stewart
GI
2009
Springer
14 years 14 days ago
Tracking an Extended Object Modeled as an Axis-Aligned Rectangle
: In many tracking applications, the extent of the target object is neglected and it is assumed that the received measurements stem from a point source. However, modern sensors are...
Marcus Baum, Uwe D. Hanebeck
FOCS
1999
IEEE
14 years 5 days ago
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-m...
Amit Sahai