Results 21 to 30 of about 22,049 (161)

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

open access: yesIEEE Access, 2017
An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail
Mingwu Zhang   +3 more
doaj   +1 more source

Forward-Secure Linkable Ring Signatures from Bilinear Maps

open access: yesCryptography, 2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting ...
Xavier Boyen, Thomas Haines
doaj   +1 more source

Cryptanalysis of the CLT13 Multilinear Map [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cheon, Jung Hee   +4 more
openaire   +1 more source

Coincidence Results for Summing Multilinear Mappings [PDF]

open access: yesProceedings of the Edinburgh Mathematical Society, 2016
AbstractIn this paper we prove coincidence results concerning spaces of absolutely summing multilinear mappings between Banach spaces. The nature of these results arises from two distinct approaches: the coincidence of two a priori different classes of summing multilinear mappings, and the summability of all multilinear mappings defined on products of ...
Blasco, Oscar   +3 more
openaire   +3 more sources

Progress on Polynomial Identity Testing - II [PDF]

open access: yes, 2014
We survey the area of algebraic complexity theory; with the focus being on the problem of polynomial identity testing (PIT). We discuss the key ideas that have gone into the results of the last few years.Comment: 17 pages, 1 figure ...
Saxena, Nitin
core   +2 more sources

Splitting of operations for alternative and Malcev structures [PDF]

open access: yes, 2015
In this paper we define pre-Malcev algebras and alternative quadri-algebras and prove that they generalize pre-Lie algebras and quadri-algebras respectively to the alternative setting.
Madariaga, Sara
core   +1 more source

Affine connections and second-order affine structures

open access: yes, 2020
Smooth manifolds have been always understood intuitively as spaces with an affine geometry on the infinitesimal scale. In Synthetic Differential Geometry this can be made precise by showing that a smooth manifold carries a natural structure of an ...
Bár, Filip
core   +1 more source

13C NMR spectral data and molecular descriptors to predict the antioxidant activity of flavonoids

open access: yesBrazilian Journal of Pharmaceutical Sciences, 2011
Tissue damage due to oxidative stress is directly linked to development of many, if not all, human morbidity factors and chronic diseases. In this context, the search for dietary natural occurring molecules with antioxidant activity, such as flavonoids ...
Luciana Scotti   +6 more
doaj   +1 more source

Sparse approximation of multilinear problems with applications to kernel-based methods in UQ

open access: yes, 2017
We provide a framework for the sparse approximation of multilinear problems and show that several problems in uncertainty quantification fit within this framework.
Nobile, Fabio   +2 more
core   +1 more source

ON THE SECURITY OF GENERALIZED MULTILINEAR MAPS BASED ON WEIL PAIRING

open access: yesBarekeng
In 2017, Tran et al. proposed a multilinear map based on Weil pairings to realize the Boneh-Silverberg scheme. They proposed an algorithm to evaluate the Boneh-Silverberg multilinear map and showed that it could be used to establish a shared key in ...
Annisa Dini Handayani   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy