نتایج جستجو برای: bilinear map

تعداد نتایج: 202631  

2001
M. GILG

Many work was done for filiform Lie algebras defined by M. Vergne [8]. An interesting fact is that this algebras are obtained by deformations of the filiform Lie algebra Ln,m. This was used for classifications in [4]. Like filiform Lie algebras, filiform Lie superalgebras are obtained by nilpotent deformations of the Lie superalgebra Ln,m. In this paper, we recall this fact and we study even co...

Journal: :IACR Cryptology ePrint Archive 2008
Craig Gentry Brent Waters

We present new techniques for achieving adaptive security in broadcast encryption systems. Previous work on fully collusion resistant broadcast encryption with short ciphertexts was limited to considering only static security. First, we present a new definition of security that we call semi-static security and show a generic “two-key” transformation from semi-statically secure systems to adapti...

Journal: :MCSS 2014
Jairo Bochi Nicolas Gourmelon

We consider discrete-time projective semilinear control systems ξt`1 “ Aputq ̈ ξt, where the states ξt are in projective space RPd ́1, inputs ut are in a manifold U of arbitrary dimension, and A : U Ñ GLpd,Rq is a differentiable mapping. An input sequence pu0, . . . , uN ́1q is called universally regular if for any initial state ξ0 P RPd ́1, the derivative of the time-N state with respect to the i...

2009
Craig Gentry Brent Waters

We present new techniques for achieving adaptive security in broadcast encryption systems. Previous work on fully collusion resistant broadcast encryption systems with very short ciphertexts was limited to considering only static security. First, we present a new definition of security that we call semi-static security and show a generic “two-key” transformation from semi-statically secure syst...

2003
Joseph Lipman Suresh Nayak Pramathanath Sastry

On a suitable category of formal schemes equipped with codimension functions we construct a canonical pseudofunctor (−)♯ taking values in the corresponding categories of Cousin complexes. Cousin complexes on such a formal scheme X functorially represent derived-category objects F by the local cohomologies H codim(x) x F (x ∈ X) together with “residue maps” from the cohomology at x to that at ea...

Journal: :IACR Cryptology ePrint Archive 2016
Kwangsu Lee Dong Hoon Lee

Functional encryption is a new paradigm of public-key encryption that allows a user to compute f (x) on encrypted data CT (x) with a private key SK f to finely control the revealed information. Multi-input functional encryption is an important extension of (single-input) functional encryption that allows the computation f (x1, . . . ,xn) on multiple ciphertexts CT (x1), . . . ,CT (xn) with a pr...

Journal: :Linear Algebra and its Applications 2021

For a bilinear map $*:\mathbb R^d\times \mathbb R^d\to R^d$ of nonnegative coefficients and vector $s\in positive entries, among an exponentially number ways combining $n$ instances $s$ using $n-1$ applications $*$ for given $n$, we are interested in the largest entry over all resulting vectors. An asymptotic behavior is that $n$-th root this converges to growth rate $\lambda$ when tends infini...

Journal: :JSW 2011
Wenxue Tan Xiping Wang

In this paper, we propose a novel practical Certificate-Less digital signing system based on bilinear map pairings defined on super elliptic curve, which is proved more efficiency than some similar systems pioneered heretofore as viewed from information security application widely applied in mobile-thin computation environment often with a narrow communication bandwidth concomitant. For a long ...

Journal: :Theoretical Computer Science 1988

Journal: :Edinburgh Mathematical Notes 1956

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید