نتایج جستجو برای: such as homomorphic deconvolution

تعداد نتایج: 5967123  

2014
Dario Catalano Antonio Marcedone Orazio Puglisi

In this paper we introduce new primitives to authenticate computation on data expressed as elements in (cryptographic) groups. As for the case of homomorphic authenticators, our primitives allow to verify the correctness of the computation without having to know of the original data set. More precisely, our contributions are two-fold. First, we introduce the notion of linearly homomorphic authe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1389

this study purported to compare and contrast the use of self-mention and evidentials as two mtadiscourse features in opinion columns of persian and english newspapers. the theoretical basis of this study is the idea that metadiscourse features vary across cultural boundaries. for this purpose, 150 persian and 150 english opinion columns were collected based on three factors of topic, audience a...

Journal: :IACR Cryptology ePrint Archive 2016
Dario Catalano Dario Fiore Luca Nizzardo

Homomorphic signature schemes allow anyone to perform computation on signed data in such a way that the correctness of computation’s results is publicly certified. In this work we analyze the security notions for this powerful primitive considered in previous work, with a special focus on adaptive security. Motivated by the complications of existing security models in the adaptive setting, we c...

1994
X Zhu

We prove that for any integers m; k, there is an integer n 0 such that if G is a graph of girth n 0 then any partial k-tree homomorphic to G is also homomorphic to C 2m+1. As a corollary, every non-bipartite graph does not have bounded treewidth duality.

Journal: :IACR Cryptology ePrint Archive 2012
Junfeng Fan Frederik Vercauteren

In this paper we port Brakerski’s fully homomorphic scheme based on the Learning With Errors (LWE) problem to the ring-LWE setting. We introduce two optimised versions of relinearisation that not only result in a smaller relinearisation key, but also faster computations. We provide a detailed, but simple analysis of the various homomorphic operations, such as multiplication, relinearisation and...

Journal: :IACR Cryptology ePrint Archive 2013
Dan Boneh Kevin Lewi Hart William Montgomery Ananth Raghunathan

A pseudorandom function F : K ×X → Y is said to be key homomorphic if given F (k1, x) and F (k2, x) there is an efficient algorithm to compute F (k1 ⊕ k2, x), where ⊕ denotes a group operation on k1 and k2 such as xor. Key homomorphic PRFs are natural objects to study and have a number of interesting applications: they can simplify the process of rotating encryption keys for encrypted data stor...

1994
Sidney Leeman

An algorithm for non-parametric estimation of one-dimensional ul-trasound pulses in echo sequences from human tissues is derived. The technique is a variation of the homomorphic ltering technique using the real cepstrum, and the underlying basis of the method is explained. The algorithm exploits a priori knowledge about the structure of rf line echo data and can employ a number of adjacent rf l...

Bahareh Shalchian Hossein Rajabi, Nahid Yaghoobi

Introduction: Hydronephrosis is one of the major causes of referring infants for nuclear medicine investigation. Renal dynamic study is the most reliable investigation for such children. However direct evaluation of renogram leads to generation of parameters that have no physiological interpretation. The configuration of renogram is very much dependent upon the rate at which radiopharmace...

Journal: :IACR Cryptology ePrint Archive 2014
Frederik Armknecht Tommaso Gagliardoni Stefan Katzenbeisser Andreas Peter

Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation. Unfortunately, recent advances in quantum computation show that many of the existing schemes completely break down once quantum computers reach maturity (mainly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید