Results 51 to 60 of about 16,254,462 (314)

Secure Obfuscation for Encrypted Group Signatures. [PDF]

open access: yesPLoS ONE, 2015
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi   +3 more
doaj   +1 more source

General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]

open access: yes, 2014
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik   +3 more
core   +5 more sources

Group schemes and local densities of quadratic lattices in residue characteristic 2 [PDF]

open access: yesCompositio Mathematica, 2012
The celebrated Smith–Minkowski–Siegel mass formula expresses the mass of a quadratic lattice $(L,Q)$ as a product of local factors, called the local densities of $(L,Q)$. This mass formula is an essential tool for the classification of integral quadratic
Sungmun Cho
semanticscholar   +1 more source

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

open access: yesCryptography, 2022
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera   +5 more
doaj   +1 more source

Reduced group schemes as iterative differential Galois groups

open access: yes, 2019
This article is on the inverse Galois problem in Galois theory of linear iterative differential equations in positive characteristic. We show that it has an affirmative answer for reduced algebraic group schemes over any iterative differential field ...
Maurischat, Andreas
core   +1 more source

Module categories over affine group schemes [PDF]

open access: yes, 2012
Let $k$ be an algebraically closed field of characteristic $p\ge 0$. Let $G$ be an affine group scheme over $k$. We classify the indecomposable exact module categories over the rigid tensor category $\text{Coh}_f(G)$ of coherent sheaves of finite ...
Shlomo Gelaki
semanticscholar   +1 more source

On Nori’s Fundamental Group Scheme [PDF]

open access: yes, 2008
Comment: 29 ...
Esnault, Hélène   +2 more
openaire   +2 more sources

Extensions of tame algebras and finite group schemes of domestic representation type [PDF]

open access: yes, 2012
Let k be an algebraically closed field. Given an extension A : B of finite-dimensional k- algebras, we establish criteria ensuring that the representation-theoretic notion of polynomial growth is preserved under ascent and descent. These results are then
Rolf Farnsteiner
semanticscholar   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps

open access: yesSensors, 2021
Signcryption schemes leveraging chaotic constructions have garnered significant research interest in recent years. These schemes have proffered practical solutions towards addressing the vast security vulnerabilities in Electronic Cash Systems (ECS). The
Chandrashekhar Meshram   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy