نتایج جستجو برای: continuous non malleability

تعداد نتایج: 1546963  

Journal: :Social Science Research Network 2021

2015
Sebastian Buchwald Manuel Mohr Andreas Zwinkau

Invasive Computing enables a resource-aware programming style, which includes adapting to external resource changes similar to malleability. We introduce asynchronously-malleable applications, which can adapt at any time without synchronizing the whole application, in contrast to specific synchronization points. We show how master-slave applications meet the requirements for asynchronous mallea...

Journal: :IACR Cryptology ePrint Archive 2013
Benoît Libert Thomas Peters Marc Joye Moti Yung

Verifiability is central to building protocols and systems with integrity. Initially, efficient methods employed the Fiat-Shamir heuristics. Since 2008, the Groth-Sahai techniques have been the most efficient in constructing non-interactive witness indistinguishable and zero-knowledge proofs for algebraic relations. For the important task of proving membership in linear subspaces, Jutla and Roy...

Journal: :Scientific American 1869

Journal: :SSRN Electronic Journal 2014

Journal: :Cryptography and Communications 2017

2010
Zhenfu Cao Ivan Visconti Zongyang Zhang

When commitment schemes are used in complex environments, e.g., the Internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to ones committed to by honest players. In the plain model, the current best solution towards resolving this problem in a constant number of rounds is the work of Ostrovsky, Persiano and Visco...

2007
Ronald Cramer Goichiro Hanaoka Dennis Hofheinz Hideki Imai Eike Kiltz Rafael Pass Abhi Shelat Vinod Vaikuntanathan

Whereas encryption schemes withstanding passive chosenplaintext attacks (CPA) can be constructed based on a variety of computational assumptions, only a few assumptions are known to imply the existence of encryption schemes withstanding adaptive chosen-ciphertext attacks (CCA2). Towards addressing this asymmetry, we consider a weakening of the CCA2 model — bounded CCA2-security — wherein securi...

Journal: :The Hastings Center report 1990
W F Anderson

Just how much can, and should we change human nature by genetic engineering? Our response to that hinges on the answers to three further questions: (1) What can we do now? Or more precisely, what are we doing now in the area of human genetic engineering? (2) What will we be able to do? In other words, what technical advances are we likely to achieve over the next five to ten years? (3) What sho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید