Results 21 to 30 of about 30,753 (229)
Unimodular homotopy algebras and Chern-Simons theory [PDF]
Quantum Chern-Simons invariants of differentiable manifolds are analyzed from the point of view of homological algebra. Given a manifold M and a Lie (or, more generally, an L-infinity) algebra g, the vector space H^*(M) \otimes g has the structure of an ...
Braun, Christopher, Lazarev, Andrey
core +3 more sources
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient
Balaji Chandrasekaran +1 more
doaj +1 more source
Electronic voting protocol from bilinear pairings
Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security. In the literature there exist some proposals, which are based on the difficult to resolve mathematical ...
Gina Gallegos García +2 more
openaire +2 more sources
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing [PDF]
Recently Tate pairing and its variations are attracted in cryptography. Their operations consist of a main iteration loop and a final exponentiation.
OKAMOTO Eiji +3 more
core +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Limited Verifier Signature from Bilinear Pairings [PDF]
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a limited verifier, who will try to preserve the privacy of the signer if the signer follows some specified rules. Also, the limited verifier can provide a proof to convince a
Chen, XF Chen, Xiaofeng +2 more
openaire +1 more source
Development of the algorithm coding alphabet by points of the elliptic curve
The paper describes the encryption algorithm alphabet by elliptic curve point with using operations of bilinear pairing.
Michail Grigorievich Babenko +2 more
doaj
The Beauville-Fujiki relation for a compact Hyperk\"ahler manifold $X$ of dimension $2k$ allows to equip the symmetric power $\text{Sym}^kH^2(X)$ with a symmetric bilinear form induced by the Beauville-Bogomolov form.
Kapfer, Simon
core +1 more source
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed.
Jinxia Yu +4 more
doaj +1 more source
Gutzwiller Projected wavefunctions in the fermonic theory of S=1 spin chains
We study in this paper a series of Gutzwiller Projected wavefunctions for S=1 spin chains obtained from a fermionic mean-field theory for general S>1/2 spin systems [Phys. Rev. B 81, 224417] applied to the bilinear-biquadratic (J-K) model.
G. V. Uimin +6 more
core +2 more sources

