Sciweavers

876 search results - page 41 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
ICASSP
2011
IEEE
13 years 2 months ago
Beating nyquist through correlations: A constrained random demodulator for sampling of sparse bandlimited signals
Technological constraints severely limit the rate at which analog-todigital converters can reliably sample signals. Recently, Tropp et al. proposed an architecture, termed the ran...
Andrew Harms, Waheed U. Bajwa, A. Robert Calderban...
CORR
2006
Springer
76views Education» more  CORR 2006»
13 years 10 months ago
Inconsistent parameter estimation in Markov random fields: Benefits in the computation-limited setting
Consider the problem of joint parameter estimation and prediction in a Markov random field: i.e., the model parameters are estimated on the basis of an initial set of data, and th...
Martin J. Wainwright
EUROCRYPT
2011
Springer
13 years 2 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
PKC
2009
Springer
115views Cryptology» more  PKC 2009»
14 years 11 months ago
Compact CCA-Secure Encryption for Messages of Arbitrary Length
This paper proposes a chosen-ciphertext secure variant of the ElGamal public-key encryption scheme which generates very compact ciphertexts for messages of arbitrary length. The ci...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
ACISP
2007
Springer
14 years 5 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...