搜索结果: 1-15 共查到“weaker now”相关记录21条 . 查询时间(0.062 秒)
Florida Current is weaker now than in the past century(图)
Florida Current weaker now past century
font style='font-size:12px;'>
2020/8/14
A key component of the Gulf Stream has markedly slowed over the past century, influencing Earth's climate -- that's the conclusion of a new research paper in Nature Communications.The U.S. N...
Authentication with weaker trust assumptions for voting systems
voting systems cryptographic protocols
font style='font-size:12px;'>
2018/3/5
Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic constr...
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
homomorphic signatures homomorphic encryption delegated computation
font style='font-size:12px;'>
2018/1/11
In delegated computing, prominent in the context of cloud computing, guaranteeing both the correctness and authenticity of computations is of critical importance. Homomorphic signatures can be used as...
Earth’s Tectonic Plates Are Weaker Than Once Thought, According to Research by Penn Geologists(图)
Earth’s Tectonic Plates Weaker Than Once Thought Penn Geologists
font style='font-size:12px;'>
2017/10/25
No one can travel inside the earth to study what happens there. So scientists must do their best to replicate real-world conditions inside the lab.“We are interested in large-scale geophysical process...
Gladiator games:Biodiversity can offer protection to weaker species
Gladiator games Biodiversity weaker species
font style='font-size:12px;'>
2017/7/20
If you pit a pair of gladiators, one strong and one weak, against each other 10 times, the outcome will likely be the same every time: The stronger competitor will defeat the weak. But if you add into...
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
KP-ABE CP-ABE kk-BDH assumption family
font style='font-size:12px;'>
2016/12/7
Attribute-Based Encryption (ABE) is a special type of public key encryption that allows users to share sensitive data efficiently through fine-grained access control. The security involved in existing...
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Blind Signatures Standard Model SPS-EQ
font style='font-size:12px;'>
2016/6/29
At Crypto’15 Fuchsbauer, Hanser and Slamanig (FHS) presented the first standardmodel
construction of efficient round-optimal blind signatures that does not require complexity
leveraging. It is conce...
Verifiable Random Functions from Weaker Assumptions
Verifiable random functions q-type assumptions
font style='font-size:12px;'>
2016/1/6
The construction of a verifiable random function (VRF) with large input space and full adaptive security from a static, non-interactive complexity assumption, like decisional Diffie-Hellman, has prove...
The Sum Can Be Weaker Than Each Part
Hash functions combiners XOR combiner
font style='font-size:12px;'>
2016/1/4
In this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the failure of one of t...
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
font style='font-size:12px;'>
2016/1/4
We construct a general-purpose multi-input functional encryption scheme in the private-key
setting. Namely, we construct a scheme where a functional key corresponding to a function
f enables a user ...
What Doesn’t Kill You Makes You Weaker: Prenatal Pollution Exposure and Educational Outcomes
Kill You Makes You Weaker Prenatal Pollution Exposure Educational Outcomes
font style='font-size:12px;'>
2016/3/9
I examine the impact of prenatal total suspended particulate (TSP) exposure on educational outcomes using county-level variation in the timing and severity of the industrial recession of the early 198...
Short Signatures From Weaker Assumptions
public-key cryptography / digital signatures RSA assumption q-DH assumption programmable hash functions
font style='font-size:12px;'>
2012/3/28
We provide constructions of (m,1)-programmable hash functions (PHFs) for m >= 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into the generic constructi...
The proofs of twin prime conjecture and weaker Polignac's conjecture
prime distribution of primes twin primes Polignac's conjecture Goldbach-type problem
font style='font-size:12px;'>
2011/9/18
This paper advanced a new method of appointedly covering prime circles with level colors of black degree, and showed twin prime conjecture and weaker Polignac's conjecture to be true with the proof by...
Short Signatures From Weaker Assumptions
digital signatures RSA assumption q-DH assumption,
font style='font-size:12px;'>
2011/7/25
We provide constructions of (m,1)-programmable hash functions (PHFs) for m >= 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into the generic constructi...
Short Signatures From Weaker Assumptions
digital signatures RSA assumption q-DH assumption programmable hash functions
font style='font-size:12px;'>
2011/6/9
We provide constructions of (m,1)-programmable hash functions (PHFs) for m >= 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into the generic constructi...