• No results found

[PDF] Top 20 Building Lossy Trapdoor Functions from Lossy Encryption

Has 10000 "Building Lossy Trapdoor Functions from Lossy Encryption" found on our website. Below are the top 20 most common "Building Lossy Trapdoor Functions from Lossy Encryption".

Building  Lossy  Trapdoor  Functions  from  Lossy  Encryption

Building Lossy Trapdoor Functions from Lossy Encryption

... While lossy trapdoor functions were created as a building block for IND-CCA secure encryption, lossy encryption was initially created to help prove security against an ... See full document

16

Non-Malleable  Functions   and  Their  Applications

Non-Malleable Functions and Their Applications

... poly-to-one functions but not vise ...for functions, which extend to trapdoor functions as well, and thus resolve the open problems left by Kiltz et ...construction from adaptive ... See full document

35

On  the  Regularity  of  Lossy  RSA:  Improved  Bounds   and  Applications  to  Padding-Based  Encryption

On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption

... Lossy trapdoor functions, defined by [22], are one of many concepts that allow us to deploy information-theoretic tools to analyze computationally-secure ... See full document

19

Regular  Lossy  Functions   and  Their  Applications  in  Leakage-Resilient  Cryptography

Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography

... ABO-RLF from any HPS for subset membership problems ...LF from any HPS following the approach of building LTF from dual HPS [Wee12]; (2) amplify the obtained RLF to ABO-RLF with branch set { ... See full document

37

More  Efficient  Cryptosystems  From $k^{th}$-Power  Residues

More Efficient Cryptosystems From $k^{th}$-Power Residues

... Abstract. At Eurocrypt 2013, Joye and Libert proposed a method for constructing public key cryptosystems (PKCs) and lossy trapdoor functions (LTDFs) from (2 α ) th -power residue symbols. ... See full document

22

New  Techniques  for  Efficient  Trapdoor  Functions   and  Applications

New Techniques for Efficient Trapdoor Functions and Applications

... as building blocks in more advanced primitives, designing more efficient TDFs translates into the same features in target ...example, lossy TDFs [PW08, PW11] are an extremely versatile primitive with a long ... See full document

34

Lossy  Trapdoor  Permutations  with  Improved  Lossiness

Lossy Trapdoor Permutations with Improved Lossiness

... technique from [23] for building ...homomorphic encryption scheme, function indices correspond with element-wise encryptions of the identity ...ElGamal encryption is used to instantiate the ... See full document

25

Hierarchical  Identity-Based (Lossy)  Trapdoor  Functions

Hierarchical Identity-Based (Lossy) Trapdoor Functions

... (lossy) trapdoor function (IB-TDF), which is the analogue of lossy trapdoor functions in the setting of identity-based cryptography ...rived from their identities, whereas secret ... See full document

39

Compact lossy and all-but-one trapdoor functions from lattice

Compact lossy and all-but-one trapdoor functions from lattice

... approach, the encrypted matrix of function indices of ABO-TDF is larger than that of LTDF in [8]. We are wondering whether we can further reduce it? The answer is yes. To solve this problem, we make use of the full rank ... See full document

13

Calculating Radar Cross Section of Lossy Targets Using the Surface Impedance Approach

Calculating Radar Cross Section of Lossy Targets Using the Surface Impedance Approach

... Abstract—In this paper, an effective numerical method based on a new surface impedance model is applied to the accurate calculation of the radar cross section of lossy conducting targets. The problem of determining ... See full document

12

Mosaic based color transform optimization for lossy and lossy to lossless compression of pathology whole slide images

Mosaic based color transform optimization for lossy and lossy to lossless compression of pathology whole slide images

... results from those obtained using traditional glass slides [20]–[22], and do not affect the pathologists’ confidence on the diagnosis ...indiscernible from the original WSIs ...for lossy regimes with ... See full document

12

A  Decade  of  Lattice  Cryptography

A Decade of Lattice Cryptography

... homomorphic encryption (FHE), first envisioned by Rivest et ...attribute-based encryption for arbitrary access policies [GVW13, BGG + 14] and general-purpose code obfuscation [GGH + ... See full document

90

Optimizing graphic files

Optimizing graphic files

... Optimizing Graphic files in Photoshop is not much different from the process in Fireworks. It is good to use Save for web under the file menu to optimize graphics as a JPEG or a GIF. In the case of JPEG, choose ... See full document

7

Encrypted Reversible Data Hiding on Compressed Image

Encrypted Reversible Data Hiding on Compressed Image

... For efficient transmission of digital data over low bandwidth channel there is need of compression. The basic goal of compression is to represent data with minimum number of bits with acceptable image quality. ... See full document

5

Shielding Effectiveness of a Lossy Metallic Enclosure

Shielding Effectiveness of a Lossy Metallic Enclosure

... results lossy MoM method is compared with other numerical methods such as finite integration technique (FIT) and MoM in commercial softwares of CST and FEKO, ... See full document

10

Dispersion Analysis of FDTD Schemes for Doubly Lossy Media

Dispersion Analysis of FDTD Schemes for Doubly Lossy Media

... recorded from 3-D experiment are larger than those recorded from ...3-D. From all these simulations, we find that ETD is generally the better choice for modeling doubly lossy media compared to ... See full document

16

Research and Analysis on Localization of 3-D Single Source in Lossy Medium Using Uniform Circular Array

Research and Analysis on Localization of 3-D Single Source in Lossy Medium Using Uniform Circular Array

... in lossy medium are presented with uniform circular array ...the lossy medium is ...given. From the results, whether the loss is known, we can choose the appropriate method to process the issues ... See full document

11

SPIN-ning Software Architectures: A Method for Exploring Complex Systems

SPIN-ning Software Architectures: A Method for Exploring Complex Systems

... sent from Env source will be eventually received (and in the correct order) by Env ...suffering from state explosion due to the infinitely possi- ble values a message may ... See full document

11

Interference and the lossless lossy beam splitter

Interference and the lossless lossy beam splitter

... 2 ( | 2 a , 0 b i ± | 0 a , 2 b i ) . (6) Two photons falling on a beam splitter from the same input arm are usually distributed between the outputs according to the laws of classical probability but this is not ... See full document

10

Simulating boson sampling in lossy architectures

Simulating boson sampling in lossy architectures

... Because every pure-loss channel can be seen as a lossless coupling interaction with an environmen- tal mode, it is easy to see that a circuit with losses can be transformed into an ideal lossless circuit by doubling the ... See full document

20

Show all 10000 documents...