Sciweavers

406 search results - page 40 / 82
» Pseudorandomness and Combinatorial Constructions
Sort
View
132
Voted
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
15 years 7 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...
FOCS
2008
IEEE
15 years 7 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
104
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Simulatable VRFs with Applications to Multi-theorem NIZK
Abstract. This paper introduces simulatable verifiable random functions (sVRF). VRFs are similar to pseudorandom functions, except that they are also verifiable: corresponding to...
Melissa Chase, Anna Lysyanskaya
80
Voted
APAL
2006
51views more  APAL 2006»
15 years 21 days ago
Models of real-valued measurability
Abstract. Solovay's random-real forcing ([1]) is the standard way of producing real-valued measurable cardinals. Following questions of Fremlin, by giving a new construction, ...
Sakaé Fuchino, Noam Greenberg, Saharon Shel...
102
Voted
FGCS
2000
83views more  FGCS 2000»
15 years 13 days ago
A Graph-based Ant System and its convergence
: A general framework for solving combinatorial optimization problems heuristically by the Ant System approach is developed. The framework is based on the concept of a construction...
Walter J. Gutjahr