نتایج جستجو برای: bounded bilinear map

تعداد نتایج: 264455  

Journal: :Finite Fields and Their Applications 2008
Ian F. Blake Theodoulos Garefalakis

The problem of computing Bilinear-Diffie-Hellman maps is considered. It is shown that the problem of computing the map is equivalent to computing a diagonal version of it. Various lower bounds on the degree of any polynomial that interpolates this diagonal version of the map are found that shows that such an interpolation will involve a polynomial of large degree, relative to the size of the se...

Journal: :journal of sciences islamic republic of iran 0

let ? be an open connected subset of the complex plane c and let t be a bounded linear operator on a hilbert space h. for ? in ? let e the orthogonal projection onto the null-space of t-?i . we discuss the necessary and sufficient conditions for the map ?? to b e continuous on ?. a generalized gram- schmidt process is also given.

Journal: :IACR Cryptology ePrint Archive 2015
Öznur Arabaci Mehmet Sabir Kiraz Isa Sertkaya Osmanbey Uzunkol

Bilinear maps are popular cryptographic primitives which have been commonly used in various modern cryptographic protocols. However, the cost of computation for bilinear maps is expensive because of their realization using variants of Weil and Tate pairings of elliptic curves. Due to increasing availability of cloud computing services, devices with limited computational resources can outsource ...

2005
Arun Ram

1 Classical Lie algebras A Lie algebra is a vector space g with a bilinear map [, ] : g× g → g such that (a) [x, y] = −[y, x], for x, y ∈ g, and (b) (Jacobi identity) [x, [y, z]] + [z, [x, y]] + [y, [z, x]] = 0, for all x, y, z ∈ g. A bilinear form 〈, 〉 : g× g → C is ad-invariant if, for all x, y, z ∈ g, 〈adx(y), z〉 = −〈y, adx(z)〉, where adx(y) = [x, y], (1.1) for x, y,∈ g. The Killing form is ...

Journal: :Research in number theory 2021

We define Jacobi forms of indefinite lattice index, and show that they are isomorphic to vector-valued modular also in this setting. consider several operations the two types objects, obtain an interesting bilinear map between arising from product operation.

2003
Sangwon Lee Yongdae Kim Kwangjo Kim DaeHyun Ryu

Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challenges is to design secure and efficient group key management. While centralized management is often appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed ...

2007
Zhu Wang Huiyan Chen

In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.

Journal: :Informatica, Lith. Acad. Sci. 2009
Wei Gao Guilin Wang Xueli Wang Zhenguang Yang

In this paper, we propose a new ID-based threshold signature scheme from the bilinear pairings, which is provably secure in the random oracle model under the bilinear Diffie–Hellman assumption. Our scheme adopts the approach that the private key associated with an identity rather than the master key of PKG is shared. Comparing to the-state-of-art work by Baek and Zheng, our scheme has the follo...

2004
Ruud van Damme Theo P. Valkering

We consider a dissipative map of the plane with a bounded perturbation term. This perturba-tion represents e.g. an extra time dependent term, a coupling to another system or noise. Theunperturbed map has a spiral attracting fixed point. We derive an analytical/numerical method todetermine the effect of the additional term on the phase portrait of the original map, as a function<...

2008
TERENCE TAO

X iv :m at h/ 02 10 08 4v 1 [ m at h. C A ] 7 O ct 2 00 2 Abstract. Recently Wolff [28] obtained a sharp L2 bilinear restriction theorem for bounded subsets of the cone in general dimension. Here we adapt the argument of Wolff to also handle subsets of “elliptic surfaces” such as paraboloids. Except for an endpoint, this answers a conjecture of Machedon and Klainerman, and also improves upon th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید