Results 11 to 20 of about 105,934 (253)

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +3 more sources

On the Oracle Properties of Bayesian Random Forest for Sparse High-Dimensional Gaussian Regression

open access: yesMathematics, 2023
Random forest (RF) is a widely used data prediction and variable selection technique. However, the variable selection aspect of RF can become unreliable when there are more irrelevant variables than relevant ones.
Oyebayo Ridwan Olaniran   +1 more
doaj   +3 more sources

Sparsity oracle inequalities for the Lasso

open access: yesElectronic Journal of Statistics, 2007
This paper studies oracle properties of $\ell_1$-penalized least squares in nonparametric regression setting with random design. We show that the penalized least squares estimator satisfies sparsity oracle inequalities, i.e., bounds in terms of the ...
Bunea, Florentina   +2 more
core   +3 more sources

Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The sponge construction is a popular method for hashing. Quickly after its introduction, the sponge was proven to be tightly indifferentiable from a random oracle up to ≈ 2c/2 queries, where c is the capacity.
Charlotte Lefevre
doaj   +1 more source

On the Power of Conditional Samples in Distribution Testing [PDF]

open access: yes, 2013
In this paper we define and examine the power of the {\em conditional-sampling} oracle in the context of distribution-property testing. The conditional-sampling oracle for a discrete distribution $\mu$ takes as input a subset $S \subset [n]$ of the ...
Chakraborty, Sourav   +3 more
core   +2 more sources

Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]

open access: yes, 2015
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core   +3 more sources

Sequential Hashing with Minimum Padding

open access: yesCryptography, 2018
This article presents a sequential domain extension scheme with minimum padding for hashing using a compression function. The proposed domain extension scheme is free from the length extension property.
Shoichi Hirose
doaj   +1 more source

Random Oracle Reducibility [PDF]

open access: yes, 2011
We discuss a reduction notion relating the random oracles in two cryptographic schemes A and B. Basically, the random oracle of scheme B reduces to the one of scheme A if any hash function instantiation of the random oracle (possibly still oracle based) which makes A secure also makes B secure. In a sense, instantiating the random oracle in scheme B is
Paul Baecher, Marc Fischlin
openaire   +1 more source

Combiners for Backdoored Random Oracles [PDF]

open access: yes, 2018
We formulate and study the security of cryptographic hash functions in the backdoored random-oracle (BRO) model, whereby a big brother designs a "good" hash function, but can also see arbitrary functions of its table via backdoor capabilities. This model captures intentional (and unintentional) weaknesses due to the existence of collision-finding or ...
Balthazar Bauer   +2 more
openaire   +2 more sources

A New Short Signature Scheme with Random Oracle from Bilinear Pairings

open access: yesJournal of Telecommunications and Information Technology, 2023
In this paper, we propose a new and efficient short signature scheme from the bilinear pairings. Our scheme is constructed by bilinear inverse-square Diffie-Hellman problem (BISDHP) and does not require any special hash function.
Sedat Akleylek   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy