Sciweavers

1094 search results - page 70 / 219
» List signature schemes
Sort
View
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
13 years 25 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
PIMRC
2008
IEEE
14 years 4 months ago
Channel state information based LLR clipping in list MIMO detection
—Suboptimal detection schemes, such as list MIMO detection, often face the challenge of having to “guess” at the decision reliability for some of the detected bits. A simple ...
David L. Milliner, Ernesto Zimmermann, John R. Bar...
EUROCRYPT
2004
Springer
14 years 3 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
ASIACRYPT
2001
Springer
14 years 1 months ago
Efficient Traitor Tracing Algorithms Using List Decoding
Abstract. We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. Although much work has focused on constructing traceability schemes,...
Alice Silverberg, Jessica Staddon, Judy L. Walker
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 8 months ago
List decoding for nested lattices and applications to relay channels
— We demonstrate a decoding scheme for nested lattice codes which is able to decode a list of a particular size which contains the transmitted codeword with high probability. Thi...
Yiwei Song, Natasha Devroye