• No results found

[PDF] Top 20 Malleable Proof Systems and Applications

Has 10000 "Malleable Proof Systems and Applications" found on our website. Below are the top 20 most common "Malleable Proof Systems and Applications".

Malleable  Proof  Systems   and  Applications

Malleable Proof Systems and Applications

... defining malleable NIZKs suitable for the above ...a proof π 0 that x 0 ∈ L, we want to have an efficient algorithm ZKEval that computes another instance x = T (x 0 ) and a proof π that x ∈ L, where ... See full document

64

Publicly  Evaluable  Pseudorandom  Functions   and  Their  Applications

Publicly Evaluable Pseudorandom Functions and Their Applications

... • In Section 5, Section 6 and Section 7, we show how to construct PEPRFs from trap- door functions (TDFs), hash proof systems (HPSs), and extractable hash proof systems (EHPSs), respectively. ... See full document

38

Locally  Decodable   and  Updatable  Non-Malleable  Codes   and  Their  Applications

Locally Decodable and Updatable Non-Malleable Codes and Their Applications

... secure RAM emulation of these functions in the presence of leakage and tampering. In contrast, our work focuses on construcing compilers that transform any dynamic RAM machine into a RAM machine secure against leakage ... See full document

32

THE PROOF OF FERMAT’S LAST THEOREM AND ITS APPLICATIONS: A STUDY

THE PROOF OF FERMAT’S LAST THEOREM AND ITS APPLICATIONS: A STUDY

... aphoristic systems when the new century rolled over prompted maxim systems for the known algebraic structures, that for the theory of fields, for example, being created by the German mathematician Ernst ... See full document

8

Proof diagrams and term rewriting with applications to computational algebra

Proof diagrams and term rewriting with applications to computational algebra

... useful applications in mathematics and computer science; see, for example, Dershowitz and Jouannaud ...forward proof procedure which were stated to be of interest in Chapter ...rewrite systems ... See full document

167

Disjunctions  for  Hash  Proof  Systems:  New  Constructions   and  Applications

Disjunctions for Hash Proof Systems: New Constructions and Applications

... Non-Interactive Proof System. Intuitively a proof system is a protocol which enables a prover to prove to a verifier that a given word or statement x is in a given ... See full document

46

The deduction theorem for strong propositional proof systems

The deduction theorem for strong propositional proof systems

... Hilbert-style proof systems we subsume all proof systems that have as proofs sequences of formulas, and formulas in such a sequence are derived from earlier formulas in the sequence by the ... See full document

18

New (and  Old)  Proof  Systems  for  Lattice  Problems

New (and Old) Proof Systems for Lattice Problems

... the lattice. Lattices have been extensively studied in computer science, and lend themselves to many natural computational problems. Perhaps the most well-known of these are the Shortest Vector Problem (SVP), which is to ... See full document

23

Non-malleable  Randomness  Encoders   and  their  Applications

Non-malleable Randomness Encoders and their Applications

... non- malleable even when the adversary, after specifying the tampering function, ad- ditionally obtains one of the states along with the decoded (tampered) ...our proof, we carefully use the augmented ... See full document

30

Non-malleable  Reductions   and  Applications

Non-malleable Reductions and Applications

... the proof of this reduction is, by far, the most technically involved part of this work, the reduction itself is very simple and efficient, using only the inner product ... See full document

34

Non-Malleable  Functions   and  Their  Applications

Non-Malleable Functions and Their Applications

... zero-knowledge proof of knowledge ...discussed applications of NMOWHFs to partially instantiating random oracles in the Bellare-Rogaway encryption scheme [BR93] and OAEP [BF06], as well as enhancing the ... See full document

35

Classes of representable disjoint NP-pairs

Classes of representable disjoint NP-pairs

... the proof system and the feasible interpolation prop- erty are expressible by disjoint NP ...propositional proof systems. Conversely, this paper aims to transfer proof-theoretic knowledge to ... See full document

30

Lower bounds: from circuits to QBF proof systems

Lower bounds: from circuits to QBF proof systems

... QBF proof complexity sketched in the beginning, the main precursor of our work is the paper (Beyersdorff, Chew, and Janota, ...the proof size originates from (Beyersdorff et ...the proof-size lower ... See full document

29

COMPARATIVE ANALYSIS OF MECHANICAL PROPERTIES OF NATURAL FIBER COMPOSITES BY USING UN-SATURATED POLYSTER RESIN

COMPARATIVE ANALYSIS OF MECHANICAL PROPERTIES OF NATURAL FIBER COMPOSITES BY USING UN-SATURATED POLYSTER RESIN

... In underwater applications time synchronization is very important like coordinated sensing tasks. Scheduling algorithms such as time division multiple access (TDMA) needed lot of time to adjust their wake-sleep ... See full document

6

196908 pdf

196908 pdf

... Bank work now being sent to an outside data processing service center Proof transit, demand deposit accounting, savings and installment loans and other applications Proof and transit, de[r] ... See full document

68

TRANSDERMAL DRUG DELIVERY SYSTEMS INFLUENCING FACTORS, STUDY METHODS AND THERAPEUTIC APPLICATIONS

TRANSDERMAL DRUG DELIVERY SYSTEMS INFLUENCING FACTORS, STUDY METHODS AND THERAPEUTIC APPLICATIONS

... These systems, also known as patches, form one of the most successful routes of drug ...these systems and their role in adhesion along with the techniques employed to measure adhesive properties have been ... See full document

9

Textbook  Non-Malleable  Commitments

Textbook Non-Malleable Commitments

... • Our basic protocol is based on black-box use of any non-interactive statistically binding commitment scheme. Such schemes, in turn, can be based on any one-to-one, one-way function, or, at the cost of an extra ... See full document

36

196903 pdf

196903 pdf

... as well as proof and transit applications Upgrading services of B300 currently in use; bank's external applications include work with four other banks, and gaming analysis A nationwide a[r] ... See full document

72

Primary-Secondary-Resolver  Membership  Proof  Systems

Primary-Secondary-Resolver Membership Proof Systems

... Prabhakaran and Xue introduced statistically hiding sets [67] (SHS for short), which are a slight variation on ZKS. Their definition of statistical hiding is formulated with computationally unbounded simulation, which ... See full document

57

Non-Malleable  Extractors   and  Non-Malleable  Codes:  Partially  Optimal  Constructions

Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions

... standard applications (such as in randomized algo- rithms, distributed computing, and cryptography), and practical random sources which are almost always biased (either because of natural noise or adversarial ... See full document

53

Show all 10000 documents...