We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Adaptively secure revocable hierarchical IBE from k-linear assumption

    Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is...

    Keita Emura, Atsushi Takayasu, Yohei Watanabe in Designs, Codes and Cryptography
    Article 15 May 2021
  2. Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model

    An aggregate signature enables to aggregation of multiple signatures generated by different signers on different messages. A synchronized aggregate...
    R. Kabaleeshwaran, Panuganti Venkata Shanmukh Sai in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  3. A sign-based linear method for horizontal linear complementarity problems

    For the horizontal linear complementarity problem, we establish a linear method based on the sign patterns of the solution of the equivalent modulus...

    **n-Hui Shao, Zhe Wang, Hai-Long Shen in Numerical Algorithms
    Article 03 May 2022
  4. Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum \(i\mathcal {O}\)

    Indistinguishability Obfuscation \((i\mathcal {O})\)...
    Aayush Jain, Huijia Lin, ... Amit Sahai in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  5. Linear Models

    Linear models are an important class of machine learning models that have been applied in various areas including genomic classification,...
    Amin Zollanvari in Machine Learning with Python
    Chapter 2023
  6. SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption

    We construct succinct non-interactive arguments (SNARGs) for bounded-depth computations assuming that the decisional Diffie-Hellman (DDH) problem is...
    Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  7. Expected linear round synchronization: the missing link for linear Byzantine SMR

    State Machine Replication (SMR) solutions often divide time into rounds, with a designated leader driving decisions in each round. Progress is...

    Oded Naor, Idit Keidar in Distributed Computing
    Article 08 January 2024
  8. Prescribed-time leader-following consensus of linear multi-agent systems by bounded linear time-varying protocols

    This paper considers the prescribed-time leader-following consensus problem of input-constrained linear multi-agent systems under generally directed...

    Kai Zhang, Bin Zhou, ... Guangren Duan in Science China Information Sciences
    Article 20 December 2023
  9. Multiple Linear Regression

    In Chapter 7 , you explored simple linear regression, which depicts the relationship between the response...
    Umesh R. Hodeghatta, Umesha Nayak in Practical Business Analytics Using R and Python
    Chapter 2023
  10. Use generalized linear models or generalized partially linear models?

    We propose test statistics based on the penalized spline to decide between generalized linear models and generalized partially linear models. The...

    **nmin Li, Haozhe Liang, ... Hua Liang in Statistics and Computing
    Article 12 July 2023
  11. Secure cooperative output regulation for linear parameter-varying systems under DoS attacks: a resilient observer approach

    This paper investigates the cooperative output regulation problem of heterogeneous linear parameter-varying multi-agent systems under...

    Chengcheng Fu, Hao Zhang, ... Huaicheng Yan in Science China Information Sciences
    Article 28 August 2023
  12. Reachability analysis of linear systems

    Shi** Chen, **nyu Ge in Acta Informatica
    Article 09 April 2024
  13. Skolemisation for Intuitionistic Linear Logic

    Focusing is a known technique for reducing the number of proofs while preserving derivability. Skolemisation is another technique designed to improve...
    Alessandro Bruni, Eike Ritter, Carsten Schürmann in Automated Reasoning
    Conference paper Open access 2024
  14. Assumption Generation for Learning-Enabled Autonomous Systems

    Providing safety guarantees for autonomous systems is difficult as these systems operate in complex environments that require the use of...
    Corina S. Păsăreanu, Ravi Mangal, ... Huafeng Yu in Runtime Verification
    Conference paper 2023
  15. Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition

    Facial Recognition (FR), despite its remarkable precision and advancements achieved through deep learning, exhibits vulnerability to security...
    Dezhi Li, Ho** Park, ... Zhe ** in Pattern Recognition and Computer Vision
    Conference paper 2024
  16. Orbweaver: Succinct Linear Functional Commitments from Lattices

    We present Orbweaver, the first plausibly post-quantum functional commitment to achieve quasilinear prover time together with...
    Ben Fisch, Zeyu Liu, Psi Vesely in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  17. Threshold and Multi-signature Schemes from Linear Hash Functions

    This paper gives new constructions of two-round multi-signa-tures and threshold signatures for which security relies solely on either the hardness of...
    Stefano Tessaro, Chenzhi Zhu in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  18. Pseudorandom functions in NC class from the standard LWE assumption

    The standard Learning with Errors (LWE) problem is associated with a polynomial modulus, which implies exponential hardness against quantum or...

    Yiming Li, Shengli Liu, ... Dawu Gu in Designs, Codes and Cryptography
    Article 20 October 2021
  19. Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings

    In a non-interactive zero-knowledge (NIZK) proof, a prover can non-interactively convince a verifier of a statement without revealing any additional...

    Shuichi Katsumata, Ryo Nishimaki, ... Takashi Yamakawa in Journal of Cryptology
    Article 18 September 2021
  20. Extractable Witness Encryption for the Homogeneous Linear Equations Problem

    Witness encryption is a cryptographic primitive which encrypts a message under an instance of an NP language and decrypts the ciphertext using a...
    Bénédikt Tran, Serge Vaudenay in Advances in Information and Computer Security
    Conference paper 2023
Did you find what you were looking for? Share feedback.