Results 41 to 50 of about 90,649 (207)

Finite mixture regression: A sparse variable selection by model selection for clustering [PDF]

open access: yes, 2014
We consider a finite mixture of Gaussian regression model for high- dimensional data, where the number of covariates may be much larger than the sample size. We propose to estimate the unknown conditional mixture density by a maximum likelihood estimator,
Devijver, Emilie
core   +4 more sources

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [PDF]

open access: yesJisuanji kexue
The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the ...
XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan
doaj   +1 more source

Discrete choice, permutations, and reconstruction [PDF]

open access: yes, 2018
In this paper we study the well-known family of Random Utility Models, developed over 50 years ago to codify rational user behavior in choosing one item from a finite set of options. In this setting each user draws i.i.d. from some distribution a utility
Chierichetti, Flavio   +2 more
core   +1 more source

Provably Secure Covert Communication on Blockchain

open access: yesCryptography, 2018
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together
Juha Partala
doaj   +1 more source

Quantum Merkle Trees [PDF]

open access: yesQuantum
Committing to information is a central task in cryptography, where a party (typically called a prover) stores a piece of information (e.g., a bit string) with the promise of not changing it.
Lijie Chen, Ramis Movassagh
doaj   +1 more source

Modeling Random Oracles Under Unpredictable Queries [PDF]

open access: yes, 2016
In recent work, Bellare, Hoang, and Keelveedhi (CRYPTO 2013) introduced a new abstraction called Universal Computational Extractors (UCEs), and showed how they can replace random oracles (ROs) across a wide range of cryptosystems. We formulate a new framework, called Interactive Computational Extractors (ICEs), that extends UCEs by viewing them as ...
Arno Mittelbach, Pooya Farshim
openaire   +3 more sources

Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes [PDF]

open access: yes, 2012
International audienceIn this paper we present efficient implementations of McEliece variants using quasi-dyadic codes. We provide secure parameters for a classical McEliece encryption scheme based on quasi-dyadic generalized Srivastava codes, and ...
B. Biswas   +20 more
core   +3 more sources

An Identity-Based Group Signature with Membership Revocation in the Standard Model [PDF]

open access: yes, 2010
Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from ...
Hartel, Pieter   +3 more
core   +12 more sources

Universally Composable Oblivious Transfer with Low Communication

open access: yesApplied Sciences, 2023
In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communication is built. This protocol obtained full simulation security based on the modulo learning with rounding (Mod-LWR) assumption.
Jiashuo Song   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy