نتایج جستجو برای: bounded bilinear map
تعداد نتایج: 264455 فیلتر نتایج به سال:
The problem of computing Bilinear-Diffie-Hellman maps is considered. It is shown that the problem of computing the map is equivalent to computing a diagonal version of it. Various lower bounds on the degree of any polynomial that interpolates this diagonal version of the map are found that shows that such an interpolation will involve a polynomial of large degree, relative to the size of the se...
let ? be an open connected subset of the complex plane c and let t be a bounded linear operator on a hilbert space h. for ? in ? let e the orthogonal projection onto the null-space of t-?i . we discuss the necessary and sufficient conditions for the map ?? to b e continuous on ?. a generalized gram- schmidt process is also given.
Bilinear maps are popular cryptographic primitives which have been commonly used in various modern cryptographic protocols. However, the cost of computation for bilinear maps is expensive because of their realization using variants of Weil and Tate pairings of elliptic curves. Due to increasing availability of cloud computing services, devices with limited computational resources can outsource ...
1 Classical Lie algebras A Lie algebra is a vector space g with a bilinear map [, ] : g× g → g such that (a) [x, y] = −[y, x], for x, y ∈ g, and (b) (Jacobi identity) [x, [y, z]] + [z, [x, y]] + [y, [z, x]] = 0, for all x, y, z ∈ g. A bilinear form 〈, 〉 : g× g → C is ad-invariant if, for all x, y, z ∈ g, 〈adx(y), z〉 = −〈y, adx(z)〉, where adx(y) = [x, y], (1.1) for x, y,∈ g. The Killing form is ...
We define Jacobi forms of indefinite lattice index, and show that they are isomorphic to vector-valued modular also in this setting. consider several operations the two types objects, obtain an interesting bilinear map between arising from product operation.
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challenges is to design secure and efficient group key management. While centralized management is often appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed ...
In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.
In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than the master key of PKG is shared. Comparing to the-state-of-art work by Baek and Zheng, our scheme has the follo...
We consider a dissipative map of the plane with a bounded perturbation term. This perturba-tion represents e.g. an extra time dependent term, a coupling to another system or noise. Theunperturbed map has a spiral attracting fixed point. We derive an analytical/numerical method todetermine the effect of the additional term on the phase portrait of the original map, as a function<...
X iv :m at h/ 02 10 08 4v 1 [ m at h. C A ] 7 O ct 2 00 2 Abstract. Recently Wolff [28] obtained a sharp L2 bilinear restriction theorem for bounded subsets of the cone in general dimension. Here we adapt the argument of Wolff to also handle subsets of “elliptic surfaces” such as paraboloids. Except for an endpoint, this answers a conjecture of Machedon and Klainerman, and also improves upon th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید