Results 51 to 60 of about 16,254,462 (314)
Secure Obfuscation for Encrypted Group Signatures. [PDF]
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts.
Yang Shi +3 more
doaj +1 more source
General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik +3 more
core +5 more sources
Group schemes and local densities of quadratic lattices in residue characteristic 2 [PDF]
The celebrated Smith–Minkowski–Siegel mass formula expresses the mass of a quadratic lattice $(L,Q)$ as a product of local factors, called the local densities of $(L,Q)$. This mass formula is an essential tool for the classification of integral quadratic
Sungmun Cho
semanticscholar +1 more source
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera +5 more
doaj +1 more source
Reduced group schemes as iterative differential Galois groups
This article is on the inverse Galois problem in Galois theory of linear iterative differential equations in positive characteristic. We show that it has an affirmative answer for reduced algebraic group schemes over any iterative differential field ...
Maurischat, Andreas
core +1 more source
Module categories over affine group schemes [PDF]
Let $k$ be an algebraically closed field of characteristic $p\ge 0$. Let $G$ be an affine group scheme over $k$. We classify the indecomposable exact module categories over the rigid tensor category $\text{Coh}_f(G)$ of coherent sheaves of finite ...
Shlomo Gelaki
semanticscholar +1 more source
On Nori’s Fundamental Group Scheme [PDF]
Comment: 29 ...
Esnault, Hélène +2 more
openaire +2 more sources
Extensions of tame algebras and finite group schemes of domestic representation type [PDF]
Let k be an algebraically closed field. Given an extension A : B of finite-dimensional k- algebras, we establish criteria ensuring that the representation-theoretic notion of polynomial growth is preserved under ascent and descent. These results are then
Rolf Farnsteiner
semanticscholar +1 more source
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar +8 more
wiley +1 more source
Signcryption schemes leveraging chaotic constructions have garnered significant research interest in recent years. These schemes have proffered practical solutions towards addressing the vast security vulnerabilities in Electronic Cash Systems (ECS). The
Chandrashekhar Meshram +5 more
doaj +1 more source

