Sciweavers

915 search results - page 75 / 183
» Proof labeling schemes
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
ICISC
2003
90views Cryptology» more  ICISC 2003»
13 years 9 months ago
Providing Receipt-Freeness in Mixnet-Based Voting Protocols
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct...
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters
VTC
2007
IEEE
142views Communications» more  VTC 2007»
14 years 2 months ago
Iterative Demodulation and Decoding for Rotated MPSK Constellations with Convolutional Coding and Signal Space Diversity
— Signal space diversity (SSD) with the rotation of the signal constellation using multi-level modulation schemes is known to provide good performance gains over fading channels....
Nauman F. Kiyani, Jos H. Weber
DEXA
2006
Springer
136views Database» more  DEXA 2006»
13 years 11 months ago
Faster Twig Pattern Matching Using Extended Dewey ID
Finding all the occurrences of a twig pattern in an XML database is a core operation for efficient evaluation of XML queries. Recently, Lu et al. [7] proposed the TJFast algorithm ...
Chung Keung Poon, Leo Yuen