Sciweavers

92
Voted
TCC
2016
Springer
56views Cryptology» more  TCC 2016»
9 years 8 months ago
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal, Melissa Chase
92
Voted
TCC
2016
Springer
50views Cryptology» more  TCC 2016»
9 years 8 months ago
Rational Sumchecks
Rational proofs, introduced by Azar and Micali (STOC 2012) are a variant of interactive proofs in which the prover is neither honest nor malicious, but rather rational. The advanta...
Siyao Guo, Pavel Hubácek, Alon Rosen, Marga...
84
Voted
TCC
2016
Springer
49views Cryptology» more  TCC 2016»
9 years 8 months ago
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov, Gil Segev
89
Voted
TCC
2016
Springer
46views Cryptology» more  TCC 2016»
9 years 8 months ago
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
A Probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form “x ...
Yuval Ishai, Mor Weiss, Guang Yang
93
Voted
TCC
2016
Springer
61views Cryptology» more  TCC 2016»
9 years 8 months ago
Homomorphic Evaluation Requires Depth
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented ...
Andrej Bogdanov, Chin Ho Lee
116
Voted
PVLDB
2016
91views Cryptology» more  PVLDB 2016»
9 years 8 months ago
LEOPARD: Lightweight Edge-Oriented Partitioning and Replication for Dynamic Graphs
This paper introduces a dynamic graph partitioning algorithm, designed for large, constantly changing graphs. We propose a partitioning framework that adjusts on the fly as the g...
Jiewen Huang, Daniel Abadi
86
Voted
PVLDB
2016
63views Cryptology» more  PVLDB 2016»
9 years 8 months ago
Repairing Data through Regular Expressions
Since regular expressions are often used to detect errors in sequences such as strings or date, it is natural to use them for data repair. Motivated by this, we propose a data rep...
Zeyu Li, Hongzhi Wang, Wei Shao, Jianzhong Li, Hon...
98
Voted
PVLDB
2016
72views Cryptology» more  PVLDB 2016»
9 years 8 months ago
A Shifting Bloom Filter Framework for Set Queries
Set queries are fundamental operations in computer systems and applications. This paper addresses the fundamental problem of designing a probabilistic data structure that can quic...
Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun ...
113
Voted
PVLDB
2016
80views Cryptology» more  PVLDB 2016»
9 years 8 months ago
Inferray: fast in-memory RDF inference
The advent of semantic data on the Web requires efficient reasoning systems to infer RDF and OWL data. The linked nature and the huge volume of data entail efficiency and scalabil...
Julien Subercaze, Christophe Gravier, Jules Cheval...
92
Voted
PVLDB
2016
77views Cryptology» more  PVLDB 2016»
9 years 8 months ago
SlimShot: In-Database Probabilistic Inference for Knowledge Bases
Increasingly large Knowledge Bases are being created, by crawling the Web or other corpora of documents, and by extracting facts and relations using machine learning techniques. T...
Eric Gribkoff, Dan Suciu