• No results found

[PDF] Top 20 Algebraic (Trapdoor) One Way Functions and their Applications

Has 10000 "Algebraic (Trapdoor) One Way Functions and their Applications" found on our website. Below are the top 20 most common "Algebraic (Trapdoor) One Way Functions and their Applications".

Algebraic (Trapdoor)  One  Way  Functions   and  their  Applications

Algebraic (Trapdoor) One Way Functions and their Applications

... on algebraic one-way functions and then we show that it is possible to construct a “batch” version of it where many statements are proven basically at the cost of a single ... See full document

39

New  Techniques  for  Efficient  Trapdoor  Functions   and  Applications

New Techniques for Efficient Trapdoor Functions and Applications

... i ∈ [n] and b ∈ {0, 1}. In other words, the entire view of a TDF adversary may be computed from y alone. At this point, the one-wayness of the TDF follows from the one-wayness of the underlying OWFE. ... See full document

34

Building  Lossy  Trapdoor  Functions  from  Lossy  Encryption

Building Lossy Trapdoor Functions from Lossy Encryption

... counterparts. One (negative) example of this type was the results of Gertner, Malkin and Reingold showing that IND-CPA secure encryption cannot be used in a black-box way to construct injective ... See full document

16

A Novel Approach for Simple Quantum Digital
signature based on Asymmetric Quantum
Cryptography

A Novel Approach for Simple Quantum Digital signature based on Asymmetric Quantum Cryptography

... quantum trapdoor one-way functions and their use in quantum ...described one already existing scheme for encryption-decryption using quantum public cryptography using quantum ... See full document

5

Hierarchical  Identity-Based (Lossy)  Trapdoor  Functions

Hierarchical Identity-Based (Lossy) Trapdoor Functions

... Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications in theoretical ...provide ... See full document

39

Non-Malleable  Functions   and  Their  Applications

Non-Malleable Functions and Their Applications

... and one-wayness in ...implies one-wayness for poly-to-one functions but not vise ...adaptive one-wayness (AOW) for injective ...and one-wayness for functions, which extend ... See full document

35

Compact lossy and all-but-one trapdoor functions from lattice

Compact lossy and all-but-one trapdoor functions from lattice

... lossy trapdoor functions (LTDF) was proposed by Peikert and Waters at STOC 2008 [8], which can be viewed as a strictly stronger powerful primitive than ...lossy trapdoor functions contains two ... See full document

13

Non-Interactive  Secure  Computation  from  One-Way  Functions

Non-Interactive Secure Computation from One-Way Functions

... general functions where each party exchanges one token with the other party, based on enhanced trapdoor permu- ...only one, while still using only constant rounds and ...of ... See full document

22

On  the  Existence  of  Extractable  One-Way  Functions

On the Existence of Extractable One-Way Functions

... many applications neither formulation ...tractable functions with other components in a larger cryptographic scheme or protocol, an adversary A may gather information z from other components and use it as ... See full document

42

Hardness  of  Non-Interactive  Differential  Privacy  from  One-Way  Functions

Hardness of Non-Interactive Differential Privacy from One-Way Functions

... of one-way functions, we believe our results are an important step towards proving hardness results for simpler families of ...has applications outside of di ff erential ...of ... See full document

27

An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks

An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks

... the trapdoor; secondly, in the path reverse phase we use Anonymous Public Key to reduce public key operations; last but not least, once every two neighbors have established a session key, they do not have to ... See full document

13

Notes on algebraic functions

Notes on algebraic functions

... neighborhood of ∞ , then f (z) is an algebraic function.” Similar statements appear in [1, 11]. Although the condition “finiteness of the number of values of the function” is emphasized as “necessary,” there is no ... See full document

10

A Reduced Order Transfer Function Models for Alstom Gasifier using Genetic Algorithm

A Reduced Order Transfer Function Models for Alstom Gasifier using Genetic Algorithm

... transfer functions obtained using Genetic Algorithm is found to be superior to those obtained using RGA loop pairing and Algebraic method proposed respectively by Haryanto and Sivakumar ... See full document

8

Monotone Circuits: One-Way Functions versus Pseudorandom Generators

Monotone Circuits: One-Way Functions versus Pseudorandom Generators

... One-way functions and pseudorandom generators play a central role in computational complexity theory and ...speaking, one-way functions (OWFs) are functions that are easy ... See full document

8

Adaptively  Secure  Garbled  Circuits  from  One-Way  Functions

Adaptively Secure Garbled Circuits from One-Way Functions

... (One could hope to bypass InputDepSimGate mode altogether and define the hybrids by changing a gate directly from RealGate mode to SimGate mode. Unfortunately, this change is easily distinguishable already for the ... See full document

37

Yao's  millionaires'  problem   and  decoy-based  public  key  encryption  by  classical  physics

Yao's millionaires' problem and decoy-based public key encryption by classical physics

... lasers. One can also use other kinds of waves, provided that Alice and Bob are connected by an appropriate waveguide ...satellite. One of the most obvious ways to address this challenge would be using radio ... See full document

9

On Pseudo-Differential Algebraic Functions

On Pseudo-Differential Algebraic Functions

... the algebraic functions of the pseudo-differential forms which entirely contain the fundamental forms of the generalized parabolic limit value ...pseudo-differential algebraic functions ... See full document

7

Equations and functions ALGEBRAIC MODELLING

Equations and functions ALGEBRAIC MODELLING

... When scientists and researchers observe number patterns occurring in nature and society, they try to find or fit a mathematical formula to represent the relationship. This is called algebraic modelling. A model ... See full document

38

Perfect  Algebraic  Immune  Functions

Perfect Algebraic Immune Functions

... bilistic algebraic attacks are worse than exhaustive search in the context of the nonlinear filter generator if the length of the LFSR is greater than or equal to ...filter functions shown in [20] do not ... See full document

16

Trapdoor  Functions  from  the  Computational  Diffie-Hellman  Assumption

Trapdoor Functions from the Computational Diffie-Hellman Assumption

... On the role of blinding. One may wonder why we need to put a blinding string b in the TDF input. Why do not we simply let the TDF input be x and derive multiple key bits for every index i of x by applying D to the ... See full document

30

Show all 10000 documents...