Zobrazeno 1 - 10
of 104
pro vyhledávání: '"Ronald Cramer"'
Publikováno v:
Theory of Cryptography ISBN: 9783031223174
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0e66e0202471d1b4e4ec7b1257ce7e35
https://doi.org/10.1007/978-3-031-22318-1_7
https://doi.org/10.1007/978-3-031-22318-1_7
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842581
CRYPTO (4)
Advances in Cryptology – CRYPTO 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
CRYPTO (4)
Advances in Cryptology – CRYPTO 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
In a proof of partial knowledge, introduced by Cramer, Damgård and Schoenmakers (CRYPTO 1994), a prover knowing witnesses for some k-subset of n given public statements can convince the verifier of this claim without revealing which k-subset. Their
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89f72d1c4b5001a0bb3c42cbfd6f727d
https://ir.cwi.nl/pub/31282
https://ir.cwi.nl/pub/31282
Publikováno v:
Journal of the ACM, 68(2)
Journal of the ACM
Journal of the ACM (JACM)
Journal of the ACM (JACM), 2021, 68 (2), pp.1-26. ⟨10.1145/3431725⟩
Journal of the ACM (JACM), Association for Computing Machinery, 2021, 68 (2), pp.1-26. ⟨10.1145/3431725⟩
Journal of the ACM
Journal of the ACM (JACM)
Journal of the ACM (JACM), 2021, 68 (2), pp.1-26. ⟨10.1145/3431725⟩
Journal of the ACM (JACM), Association for Computing Machinery, 2021, 68 (2), pp.1-26. ⟨10.1145/3431725⟩
In this article, we study the geometry of units and ideals of cyclotomic rings and derive an algorithm to find a mildly short vector in any given cyclotomic ideal lattice in quantum polynomial time, under some plausible number-theoretic assumptions.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae801b84b2a4ef4c2f1bc858e62c917e
http://hdl.handle.net/20.500.12278/113134
http://hdl.handle.net/20.500.12278/113134
Publikováno v:
ASIACRYPT 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
Lecture Notes in Computer Science ISBN: 9783030920678
Lai et al. (CCS 2019) have shown how Bulletproof’s arithmetic circuit zero-knowledge protocol (Bootle et al., EUROCRYPT 2016 and Bünz et al., S&P 2018) can be generalized to work for bilinear group arithmetic circuits directly, i.e., without requi
Publikováno v:
CRYPTO 2021
Autor:
Gabriele Spini, Emiliano Mancini, Thomas Attema, Mark Abspoel, Jan de Gier, Serge Fehr, Thijs Veugen, Maran van Heesch, Daniël Worm, Andrea De Luca, Ronald Cramer, Peter M.A. Sloot
Publikováno v:
Journal of Medical Systems, 46(12):84. SPRINGER
Journal of Medical Systems, 46(12), 84.1-84.11
Journal of Medical Systems, 46(12), 84.1-84.11
Background HIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowled
Autor:
Chaoping Xing, Ronald Cramer
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2020
Advances in Cryptology – EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457204
EUROCRYPT (1)
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2020
Advances in Cryptology – EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457204
EUROCRYPT (1)
A blackbox secret sharing (BBSS) scheme works in exactly the same way for all finite Abelian groups G; it can be instantiated for any such group G and only black-box access to its group operations and to random group elements is required. A secret is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::853d1f6c03503561daf1d7fa7c4fad77
https://ir.cwi.nl/pub/30154
https://ir.cwi.nl/pub/30154
Publikováno v:
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, 66(1), 263-272
IEEE Transactions on Information Theory, 66(1), 263-272
Reed-Muller codes are among the most important classes of locally correctable codes. Currently local decoding of Reed-Muller codes is based on decoding on lines or quadratic curves to recover one single coordinate. To recover multiple coordinates sim
Autor:
Thomas Attema, Ronald Cramer
Publikováno v:
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568764
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
Σ-Protocols provide a well-understood basis for secure algorithmics. Recently, Bulletproofs (Bootle et al., EUROCRYPT 2016, and Bünz et al., S&P 2018) have been proposed as a drop-in replacement in case of zero-knowledge (ZK) for arithmetic circuit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::288d9e81ec7fe7978f3e96d53145977c
https://doi.org/10.1007/978-3-030-56877-1_18
https://doi.org/10.1007/978-3-030-56877-1_18