搜索结果: 1-15 共查到“Separations”相关记录30条 . 查询时间(0.091 秒)
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Collision Resistance Statistical Zero Knowledge Black box separations
2019/6/12
The complexity of collision-resistant hash functions has been long studied in the theory of cryptography. While we often think about them as a Minicrypt primitive, black-box separations demonstrate th...
17th Asia-Pacific International Symposium on Microscale Separations and Analysis
17th Asia-Pacific International Symposium Microscale Separations and Analysis
2017/10/30
We are organizing the 17th Asia-Pacific International Symposium on Microscale Separation and Analysis (APCE 2017) from November 10-13 2017 at Songjiang New Century Grand Hotel (Shanghai, China). The s...
2017年可持续分离新兴膜材料研讨会(Symposium SM7—Emerging Membrane Materials for Sustainable Separations)
2017年 可持续分离新兴膜材料 研讨会
2017/3/9
Membrane technology has been implemented in many fields as energy-saving and sustainable process. Water in great part of the world is provided by seawater desalination using reverse osmosis membrane p...
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Communication Complexity Conditional Disclosure of Secrets Amplification
2017/2/24
In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs xx and yy respectively, wish to release a common secret ss to Carol...
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Black-box separations circular security
2017/2/21
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Matrix Diffie-Hellman Problems Black-Box Reductions Decisional Linear Assumption
2017/2/20
In this paper we provide new algebraic tools to study the relationship between different Matrix Diffie-Hellman (MDDH) Problems, which are recently introduced as a natural generalization of the so-call...
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
black-box separation public key encryption one-way function
2016/12/10
Separating public key encryption from one way functions is one of the fundamental goals of complexity-based cryptography. Beginning with the seminal work of Impagliazzo and Rudich (STOC, 1989), a sequ...
KDM Security for Identity-Based Encryption: Constructions and Separations
KDM security IBE IB-HPS
2016/12/8
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Brownian Ratchets: Molecular Separations in Lipid Bilayers Supported on Patterned Arrays
4-Chloro-7-nitrobenzofurazan Chemistry, Physical Diffusion Electrophoresis Fluorescence Fluorescent Dyes Lipid Bilayers Membrane Fluidity Membrane Proteins Membrane Proteins Phosphatidylethanolamines Phosphatidylethanolamines Phosphatidylserines Phosphatidylserines Phospholipids Phospholipids Physicochemical Phenomena Temperature Xanthenes
2016/5/23
Brownian ratchets use a time-varying asymmetric potential that can be applied to separate diffusing particles or molecules. A new type of Brownian ratchet, a geometrical Brownian ratchet, has been rea...
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
random oracle model idealized models indistinguishability obfuscation
2016/1/6
It is well known that the random oracle model is not sound in the sense that there exist
cryptographic systems that are secure in the random oracle model but when instantiated by any
family of hash ...
Black Box Separations for Differentially Private Protocols
Differentially Private Protocols Computational Complexity Random Oracle
2016/1/5
We study the maximal achievable accuracy of distributed differentially private protocols for a large natural class of boolean functions, in the computational setting.
Separations in Circular Security for Arbitrary Length Key Cycles
Separations Arbitrary Length Key Cycles
2014/3/6
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ...
Separations, Sorting and Cyclical Unemployment
sorting unemployment business cycles search-matching vacancies
2012/10/22
This paper establishes a new fact about the compositional changes in the pool of unemployed over the U.S. business cycle and evaluates a number of theories that can potentially explain it. Using micro...
Job Separations and Informality in the Russian Labor Market
job separations informality Russia
2012/10/18
In the years 2003-2008 the Russian economy experienced a period of strong and sustained growth, which was accompanied by large worker turnover and rising informality. We investigate whether the burden...
Discovery of two L & T binaries with wide separations and peculiar photometric properties
Discovery binaries separations peculiar photometric properties
2011/9/28
We present spatially resolved photometric and spectroscopic observations of two wide brown dwarf binaries uncovered by the SIMP near-infrared proper motion survey. The first pair (SIMP J1619275+031350...