A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
[chapter]
2018
Lecture Notes in Computer Science
In this work, we affirmatively close the gap between ABS schemes based on bilinear maps and lattices by constructing the first lattice-based ABS scheme for unbounded circuits in the random oracle model ...
This, in fact, was a formalization lacking in many existing anonymous signatures from lattices so far (e.g., group signatures). ...
In particular, we are grateful for Yusuke Sakai and Takahiro Matsuda for the helpful discussions and feedback on this work. The first author was funded by a research grant from the UK Government. ...
doi:10.1007/978-3-319-76581-5_4
fatcat:ybab6uxqvfgy7l5xx43vj5fwb4
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
[article]
2020
arXiv
pre-print
Basing on the framework, we obtain the first post-quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard ...
We also discuss about the ability of modification our framework to support the unbounded number of ciphertext tags inspired from the work of Brakerski and Vaikuntanathan at CRYPTO 2016. ...
Chow and anonymous reviewers for their insightful comments which improve the content and presentation of the manuscript. ...
arXiv:2007.06353v1
fatcat:ukwzao7xazehbhbqarwdus4mzm
A survey on functional encryption
2021
Advances in Mathematics of Communications
In particular, we mention several schemes for each class, providing their security assumptions and comparing their properties. ...
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted ...
We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments. ...
doi:10.3934/amc.2021049
fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4
A Note on the Post-Quantum Security of (Ring) Signatures
[article]
2021
arXiv
pre-print
This work revisits the security of classical signatures and ring signatures in a quantum world. ...
We propose a new definition that does not suffer from the above issue. Our definition is an analog to the blind-unforgeability in the ring signature setting. ...
Zvika Brakerski and Yael Tauman Kalai. A framework for efficient signatures, ring signatures and identity
based encryption in the standard model. ...
arXiv:2112.06078v1
fatcat:potybhcv7nfqbaw4ek5ggiklmu
Practical Round-Optimal Blind Signatures in the Standard Model
[chapter]
2015
Lecture Notes in Computer Science
We present a construction of practically efficient round-optimal blind signatures in the standard model. ...
It is conceptually simple and builds on the recent structurepreserving signatures on equivalence classes (SPS-EQ) from Asiacrypt'14. ...
Acknowledgements We would like to thank the anonymous reviewers of Crypto'15 for their valuable comments. ...
doi:10.1007/978-3-662-48000-7_12
fatcat:qkhhfijxavbalpg3f3nrp34sge
Reconstructing Hardware Transactional Memory for Workload Optimized Systems
[chapter]
2011
Lecture Notes in Computer Science
With the continuity of Moore's law in the multicore era and the emerging cloud computing, parallelism has been pervasively available almost everywhere, from traditional processor pipelines to large-scale ...
The two-day technical program of APPT 2011 provided an excellent venue capturing the state of the art and practice in parallel architectures, parallel software and distributed and cloud computing. ...
The research was funded by Intel ...
doi:10.1007/978-3-642-24151-2_1
fatcat:32cx745cn5cfdm5sbeah6eyiey
Building a Learning Organiza-tion
2001
Harvard Business Review
unpublished
The students folloM' a schedule given in the web sile, learn the related chapters from their textbooks, and return the exercises by strict deadlines. ...
The paper constitutes evidence that the stock markets are not efficient. ...
Acknowledgements We vvould like to thank Hans Cycon and his group for enjoyable co-operation. They developed the highly optimized Wavelet Video algorithms and the codec. ...
fatcat:eg4jwjyr5rh7hbhavv56v4snim
Aspect-oriented technology for dependable operating systems
2017
Transient faults are caused by a multitude of sources, such as fluctuation of the supply voltage, electromagnetic interference, and radiation from the natural environment. ...
This thesis focuses on software-implemented fault tolerance for operating systems because they are the most critical pieces of software in a computer system: All computer programs depend on the integrity ...
In the following two case studies, Read-Only Memory (ROM) segments are excluded from fault injection for two reasons: First, deeply embedded systems targeted by eCos use flash memory as ROM storage. ...
doi:10.17877/de290r-17995
fatcat:4lowsbiyx5ckjglqa3ena4zy4a
Design and performance analysis of data-independent stream processing systems
[article]
2008
Some of them, however, I like to mention here in person, but this does not mean that I have forgotten about the others. ...
Acknowledgements Because I write this thesis at a relatively late stage of my professional life, there are simply far too many people that have influenced, encouraged and supported me over the years to ...
However, the canonical schedule σ B is a function with signature {a, b} −→ N, whereas the schedules for Buf (a, c) and Buf (c, b) need to have signatures {a, c} −→ N and {c, b} −→ N, respectively. ...
doi:10.6100/ir636537
fatcat:kz4wh5pqujax3c4rmoziqbr7yq
ICN 2013 Committee ICN General Chair
ICN 2013 The Twelfth International Conference on Networks Foreword The Twelfth International Conference on Networks
unpublished
We hope that ICN 2013 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of networks. ...
We are grateful to the members of the ICN 2013 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. ...
ACKNOWLEDGEMENT The authors thank to the anonymous reviewers for their comments and suggestions resulting in an improved presentation of the addressed issues. ...
fatcat:quv4wx7o3bbypfgbbgw3qeqdoa
Software Studies
2009
Processing: Digital Fictions, Computer Games, and Software Studies
unpublished
MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, email special_sales@mitpress.mit.edu or write to ...
table in the Atari's cartridge-based ROM. ...
This construction, based on a lattice, is a special kind of graph called a grid graph. ...
fatcat:rkrzdjrkz5bsrarywb55nr4wpa
Worst-case resource-usage analysis of java card classic editions application bytecode
2016
Our static analysis provides the high-level information for subsequent worst-case resource-usage analysis in our tool which exploits well-known results and techniques from hard real-time systems. ...
Given the size and global nature of the user base, and the commercial importance of Java Card, there is a stunning lack of tools supporting analysis or certification of the memory, transactional or CPU ...
, and gives reasonable results in terms of precision and efficiency". ...
doi:10.25560/42538
fatcat:ucdmho3jrzawzmtgafz3yd6vqq
Economic Impacts and Commercialization of Nanotechnology
[chapter]
Nanotechnology: Societal Implications
In this way, we advance from assumptions and speculation to investigation and problem solving. ...
Nanotechnology, biotechnology, and information and cognitive science are converging in laboratories with startling-and for some alarming-results. The pace and significance of discovery are dizzying. ...
The energetic properties of matter change at that scale. The surface area to volume ratios become relevant, and even the inter-atomic distances in a metal lattice change from surface effects. ...
doi:10.1007/978-1-4020-5432-7_1
fatcat:fsr25iy4nzgllkn5niicmenwr4