Sciweavers

915 search results - page 64 / 183
» Proof labeling schemes
Sort
View
LREC
2008
145views Education» more  LREC 2008»
13 years 9 months ago
Annotating Superlatives
This paper describes a three-part annotation scheme for superlatives: The first identifies syntactic classes, since superlatives can serve different semantic purposes. The second ...
Silke Scheible
EUROCRYPT
2004
Springer
14 years 1 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
ICISC
2004
96views Cryptology» more  ICISC 2004»
13 years 9 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 9 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
INFOCOM
2009
IEEE
14 years 2 months ago
Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture
—A novel counter architecture, called Counter Braids, has recently been proposed for accurate per-flow measurement on high-speed links. Inspired by sparse random graph codes, Co...
Yi Lu, Balaji Prabhakar