Delegating Quantum Computation in the Quantum Random Oracle Model [PDF]
A delegation scheme allows a computationally weak client to use a server's resources to help it evaluate a complex circuit without leaking any information about the input (other than its length) to the server. In this paper, we consider delegation schemes for quantum circuits, where we try to minimize the quantum operations needed by the client.
openaire +2 more sources
ID-based signature without trusted PKG
PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is ...
ZHOU Liang1, LI Da-peng2, YANG Yi-xian1
doaj +2 more sources
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing ...
HUANG Zhen-jie1 +2 more
doaj +2 more sources
Active learning with human heuristics: an algorithm robust to labeling bias
Active learning enables prediction models to achieve better performance faster by adaptively querying an oracle for the labels of data points. Sometimes the oracle is a human, for example when a medical diagnosis is provided by a doctor. According to the
Sriram Ravichandran +5 more
doaj +1 more source
Weakened Random oracle Models Without Programmability.
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
Hybrid Quantum-Classical Algorithm for Robust Optimization via Stochastic-Gradient Online Learning. [PDF]
Lim D, Doriguello JF, Rebentrost P.
europepmc +1 more source
Assessing Treatment Effects in Observational Data With Missing Confounders: A Comparative Study of Practical Doubly-Robust and Traditional Missing Data Methods. [PDF]
Williamson BD +15 more
europepmc +1 more source
On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs. [PDF]
Chen J, Peng W, Wang Y, Bian Y.
europepmc +1 more source
A multi-authority attribute ring signature supporting dynamic policies and dual anonymity for zero-trust networks. [PDF]
Chen J, Zhou X, Fu W, Mao Y, Wang J.
europepmc +1 more source
Steering Protein Generative Models at Test-Time for Guided AAV2 Capsid Design. [PDF]
Viggiano B +6 more
europepmc +1 more source

