Filters








13 Hits in 22.2 sec

Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices [chapter]

Ali El Kaafarani, Shuichi Katsumata
2018 Lecture Notes in Computer Science  
In this work, we affirmatively close the gap between ABS schemes based on bilinear maps and lattices by constructing the first lattice-based ABS scheme for unbounded circuits in the random oracle model  ...  This, in fact, was a formalization lacking in many existing anonymous signatures from lattices so far (e.g., group signatures).  ...  In particular, we are grateful for Yusuke Sakai and Takahiro Matsuda for the helpful discussions and feedback on this work. The first author was funded by a research grant from the UK Government.  ... 
doi:10.1007/978-3-319-76581-5_4 fatcat:ybab6uxqvfgy7l5xx43vj5fwb4

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption [article]

Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
2020 arXiv   pre-print
Basing on the framework, we obtain the first post-quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard  ...  We also discuss about the ability of modification our framework to support the unbounded number of ciphertext tags inspired from the work of Brakerski and Vaikuntanathan at CRYPTO 2016.  ...  Chow and anonymous reviewers for their insightful comments which improve the content and presentation of the manuscript.  ... 
arXiv:2007.06353v1 fatcat:ukwzao7xazehbhbqarwdus4mzm

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
In particular, we mention several schemes for each class, providing their security assumptions and comparing their properties.  ...  <p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4

A Note on the Post-Quantum Security of (Ring) Signatures [article]

Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021 arXiv   pre-print
This work revisits the security of classical signatures and ring signatures in a quantum world.  ...  We propose a new definition that does not suffer from the above issue. Our definition is an analog to the blind-unforgeability in the ring signature setting.  ...  Zvika Brakerski and Yael Tauman Kalai. A framework for efficient signatures, ring signatures and identity based encryption in the standard model.  ... 
arXiv:2112.06078v1 fatcat:potybhcv7nfqbaw4ek5ggiklmu

Practical Round-Optimal Blind Signatures in the Standard Model [chapter]

Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015 Lecture Notes in Computer Science  
We present a construction of practically efficient round-optimal blind signatures in the standard model.  ...  It is conceptually simple and builds on the recent structurepreserving signatures on equivalence classes (SPS-EQ) from Asiacrypt'14.  ...  Acknowledgements We would like to thank the anonymous reviewers of Crypto'15 for their valuable comments.  ... 
doi:10.1007/978-3-662-48000-7_12 fatcat:qkhhfijxavbalpg3f3nrp34sge

Reconstructing Hardware Transactional Memory for Workload Optimized Systems [chapter]

Kunal Korgaonkar, Prabhat Jain, Deepak Tomar, Kashyap Garimella, Veezhinathan Kamakoti
2011 Lecture Notes in Computer Science  
With the continuity of Moore's law in the multicore era and the emerging cloud computing, parallelism has been pervasively available almost everywhere, from traditional processor pipelines to large-scale  ...  The two-day technical program of APPT 2011 provided an excellent venue capturing the state of the art and practice in parallel architectures, parallel software and distributed and cloud computing.  ...  The research was funded by Intel  ... 
doi:10.1007/978-3-642-24151-2_1 fatcat:32cx745cn5cfdm5sbeah6eyiey

Building a Learning Organiza-tion

Wolfgang Coy, Uwe Pirr, Joel Greenberg, Marja Kuittinen, Erkki Sutinen, Heikki Topi, Marko Turpeinen, Haataja Arto, Suhonen Jarkko, Sutinen Erkki, Zdenčk Ryjaček, Jan Rychlik (+22 others)
2001 Harvard Business Review   unpublished
The students folloM' a schedule given in the web sile, learn the related chapters from their textbooks, and return the exercises by strict deadlines.  ...  The paper constitutes evidence that the stock markets are not efficient.  ...  Acknowledgements We vvould like to thank Hans Cycon and his group for enjoyable co-operation. They developed the highly optimized Wavelet Video algorithms and the codec.  ... 
fatcat:eg4jwjyr5rh7hbhavv56v4snim

Aspect-oriented technology for dependable operating systems

Christoph Borchert, Technische Universität Dortmund, Technische Universität Dortmund
2017
Transient faults are caused by a multitude of sources, such as fluctuation of the supply voltage, electromagnetic interference, and radiation from the natural environment.  ...  This thesis focuses on software-implemented fault tolerance for operating systems because they are the most critical pieces of software in a computer system: All computer programs depend on the integrity  ...  In the following two case studies, Read-Only Memory (ROM) segments are excluded from fault injection for two reasons: First, deeply embedded systems targeted by eCos use flash memory as ROM storage.  ... 
doi:10.17877/de290r-17995 fatcat:4lowsbiyx5ckjglqa3ena4zy4a

Design and performance analysis of data-independent stream processing systems [article]

Mak, RH (Rudolf), Hilbers, PAJ (Peter), Berkel, CH (Kees) Van, Lukkien, JJ (Johan)
2008
Some of them, however, I like to mention here in person, but this does not mean that I have forgotten about the others.  ...  Acknowledgements Because I write this thesis at a relatively late stage of my professional life, there are simply far too many people that have influenced, encouraged and supported me over the years to  ...  However, the canonical schedule σ B is a function with signature {a, b} −→ N, whereas the schedules for Buf (a, c) and Buf (c, b) need to have signatures {a, c} −→ N and {c, b} −→ N, respectively.  ... 
doi:10.6100/ir636537 fatcat:kz4wh5pqujax3c4rmoziqbr7yq

ICN 2013 Committee ICN General Chair

Pascal Lorenz, Pascal Lorenz, Pascal Lorenz, Pascal Anelli, Max Agueh, Lacsc -Ece Paris, France Aho, Harald Baier, Hochschule Darmstadt, Alvaro Germany, Barradas, Carlos Westphall (+78 others)
ICN 2013 The Twelfth International Conference on Networks Foreword The Twelfth International Conference on Networks   unpublished
We hope that ICN 2013 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of networks.  ...  We are grateful to the members of the ICN 2013 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  ACKNOWLEDGEMENT The authors thank to the anonymous reviewers for their comments and suggestions resulting in an improved presentation of the addressed issues.  ... 
fatcat:quv4wx7o3bbypfgbbgw3qeqdoa

Software Studies

Matthew Fuller, Lev Manovich, Noah Wardrip-Fruin, John Bell, Ian Bogost, Jeremy Douglass, Mark Marino, Michael Mateas, Casey Reas, Mark Sample, Noah Vawter, London
2009 Processing: Digital Fictions, Computer Games, and Software Studies   unpublished
MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, email special_sales@mitpress.mit.edu or write to  ...  table in the Atari's cartridge-based ROM.  ...  This construction, based on a lattice, is a special kind of graph called a grid graph.  ... 
fatcat:rkrzdjrkz5bsrarywb55nr4wpa

Worst-case resource-usage analysis of java card classic editions application bytecode

Luke Dominic Mark Urquhart, Chris Hankin
2016
Our static analysis provides the high-level information for subsequent worst-case resource-usage analysis in our tool which exploits well-known results and techniques from hard real-time systems.  ...  Given the size and global nature of the user base, and the commercial importance of Java Card, there is a stunning lack of tools supporting analysis or certification of the memory, transactional or CPU  ...  , and gives reasonable results in terms of precision and efficiency".  ... 
doi:10.25560/42538 fatcat:ucdmho3jrzawzmtgafz3yd6vqq

Economic Impacts and Commercialization of Nanotechnology [chapter]

Mihail C. Roco, William Sims Bainbridge
Nanotechnology: Societal Implications  
In this way, we advance from assumptions and speculation to investigation and problem solving.  ...  Nanotechnology, biotechnology, and information and cognitive science are converging in laboratories with startling-and for some alarming-results. The pace and significance of discovery are dizzying.  ...  The energetic properties of matter change at that scale. The surface area to volume ratios become relevant, and even the inter-atomic distances in a metal lattice change from surface effects.  ... 
doi:10.1007/978-1-4020-5432-7_1 fatcat:fsr25iy4nzgllkn5niicmenwr4