Search
Search Results
-
Adaptively secure revocable hierarchical IBE from k-linear assumption
Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...
-
Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model
An aggregate signature enables to aggregation of multiple signatures generated by different signers on different messages. A synchronized aggregate... -
A sign-based linear method for horizontal linear complementarity problems
For the horizontal linear complementarity problem, we establish a linear method based on the sign patterns of the solution of the equivalent modulus...
-
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum \(i\mathcal {O}\)
Indistinguishability Obfuscation \((i\mathcal {O})\)... -
Linear Models
Linear models are an important class of machine learning models that have been applied in various areas including genomic classification,... -
SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption
We construct succinct non-interactive arguments (SNARGs) for bounded-depth computations assuming that the decisional Diffie-Hellman (DDH) problem is... -
Expected linear round synchronization: the missing link for linear Byzantine SMR
State Machine Replication (SMR) solutions often divide time into rounds, with a designated leader driving decisions in each round. Progress is...
-
Prescribed-time leader-following consensus of linear multi-agent systems by bounded linear time-varying protocols
This paper considers the prescribed-time leader-following consensus problem of input-constrained linear multi-agent systems under generally directed...
-
Multiple Linear Regression
In Chapter 7 , you explored simple linear regression, which depicts the relationship between the response... -
Use generalized linear models or generalized partially linear models?
We propose test statistics based on the penalized spline to decide between generalized linear models and generalized partially linear models. The...
-
Secure cooperative output regulation for linear parameter-varying systems under DoS attacks: a resilient observer approach
This paper investigates the cooperative output regulation problem of heterogeneous linear parameter-varying multi-agent systems under...
-
-
Skolemisation for Intuitionistic Linear Logic
Focusing is a known technique for reducing the number of proofs while preserving derivability. Skolemisation is another technique designed to improve... -
Assumption Generation for Learning-Enabled Autonomous Systems
Providing safety guarantees for autonomous systems is difficult as these systems operate in complex environments that require the use of... -
Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition
Facial Recognition (FR), despite its remarkable precision and advancements achieved through deep learning, exhibits vulnerability to security... -
Orbweaver: Succinct Linear Functional Commitments from Lattices
We present Orbweaver, the first plausibly post-quantum functional commitment to achieve quasilinear prover time together with... -
Threshold and Multi-signature Schemes from Linear Hash Functions
This paper gives new constructions of two-round multi-signa-tures and threshold signatures for which security relies solely on either the hardness of... -
Pseudorandom functions in NC class from the standard LWE assumption
The standard Learning with Errors (LWE) problem is associated with a polynomial modulus, which implies exponential hardness against quantum or...
-
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings
In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a verifier of a statement without revealing any additional...
-
Extractable Witness Encryption for the Homogeneous Linear Equations Problem
Witness encryption is a cryptographic primitive which encrypts a message under an instance of an NP language and decrypts the ciphertext using a...