Results 21 to 30 of about 105,934 (253)

Verifiable Random Oracles

open access: yes, 2021
Ziel dieser Arbeit ist es, Random Oracle zu instanziieren, ohne dabei Sicherheit zu verlieren, die im Random Oracle Modell bewiesen wurde. Das dies mit Funktionsfamilien nicht geht ist eine wohl bekannte Aussage, die zuerst von Halevi et al. (IACR’1998) gezeigt wurde.
openaire   +2 more sources

Discrete choice, permutations, and reconstruction [PDF]

open access: yes, 2018
In this paper we study the well-known family of Random Utility Models, developed over 50 years ago to codify rational user behavior in choosing one item from a finite set of options. In this setting each user draws i.i.d. from some distribution a utility
Chierichetti, Flavio   +2 more
core   +1 more source

Practically secure quantum position verification

open access: yesNew Journal of Physics, 2021
We discuss quantum position verification (QPV) protocols in which the verifiers create and send single-qubit states to the prover. QPV protocols using single-qubit states are known to be insecure against adversaries that share a small number of entangled
Siddhartha Das, George Siopsis
doaj   +1 more source

Calibrating nonconvex penalized regression in ultra-high dimension [PDF]

open access: yes, 2013
We investigate high-dimensional nonconvex penalized regression, where the number of covariates may grow at an exponential rate. Although recent asymptotic theory established that there exists a local minimum possessing the oracle property under general ...
Kim, Yongdai, Li, Runze, Wang, Lan
core   +1 more source

Using intelligence techniques to automate Oracle testing [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2023
The software development life cycle includes software testing as a critical step. Oracle testing is necessary to determine if a particular test case detects an error because the purpose of testing is to ensure that the application adheres to its ...
Nour Sulaiman, safwan hasson
doaj   +1 more source

An Oracle Approach for Interaction Neighborhood Estimation in Random Fields [PDF]

open access: yes, 2010
We consider the problem of interaction neighborhood estimation from the partial observation of a finite number of realizations of a random field.
Lerasle, Matthieu   +1 more
core   +2 more sources

Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
In this paper we construct and consider a new group-based digital signature scheme with evolving secret key, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a ...
Mariusz Jurkiewicz
doaj   +1 more source

Quantum Merkle Trees [PDF]

open access: yesQuantum
Committing to information is a central task in cryptography, where a party (typically called a prover) stores a piece of information (e.g., a bit string) with the promise of not changing it.
Lijie Chen, Ramis Movassagh
doaj   +1 more source

On Pseudo-Random Oracles [PDF]

open access: yesTatra Mountains Mathematical Publications, 2012
ABSTRACT Many cryptographic systems which involve hash functions have proof of their security in a so called random oracle model. Behavior of hash functions used in such cryptographic systems should be as close as possible to the behavior of a random function. There are several properties of hash functions dealing with a random behavior.
openaire   +1 more source

A Machine-Checked Formalization of the Generic Model and the Random Oracle Model [PDF]

open access: yes, 2004
Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key.
A. Fiat   +25 more
core   +6 more sources

Home - About - Disclaimer - Privacy