搜索结果: 1-15 共查到“projective”相关记录123条 . 查询时间(0.046 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars: On the dimension of limit sets on the real projective plane via stationary measures
实射影平面 极限集 维数 平稳测度
2023/11/29
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Projective Manifolds with Pseudoeffective Cotangent Bundle II
伪有效 余切丛 射影流形
2023/11/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:On the dimension of limit sets on the real projective plane via stationary measures
实射 影平面 极限集 维数 平稳测度
2023/11/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:t-stabilities and t-structures for the weighted projective line of type (2)
加权投影线 t-稳定性 t-结构
2023/11/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:The pseudoeffective cone on projective manifolds
射影流形 赝有效锥 全纯线丛
2023/5/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Projective measure without Projective Baire
投射贝尔 投射测量 勒贝格可测
2023/5/6
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Density of orbits and arithmetic degrees of automorphisms of projective threefolds
射影三重 轨道密度 自同构 算术度
2023/4/18
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
UC commitment smooth projective hash function SPHF
2019/9/23
Hash proof systems or smooth projective hash functions (SPHFs) have been proposed by Cramer and Shoup (Eurocrypt'02) and can be seen as special type of zero-knowledge proof system for a language. Whil...
Oblivious transfer is an important tool against malicious cloud server providers. Halevi-Kalai OT, which is based on smooth projective hash(SPH), is a famous and the most efficient framework for 11-ou...
Founding Cryptography on Smooth Projective Hashing
oblivious transfer secure multiparty computation malicious adversaries
2018/5/16
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and Y. Kalai (2012), Journal of Cryptology 25(1)), which is based on smooth projective hash(SPH), is a f...
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
DCR DDH inner-product functional encryption
2017/2/20
In an inner-product functional encryption scheme, the plaintexts are vectors and the owner of the secret key can delegate the ability to compute weighted sums of the coefficients of the plaintext of a...
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Cryptographic reverse firewall malleable smooth projective hash function oblivious signature-based envelope
2016/12/9
Motivated by the revelations of Edward Snowden, post-Snowden cryptography has become a prominent research direction in recent years. In Eurocrypt 2015, Mironov and Stephens-Davidowitz proposed a novel...
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps
Indistinguishability Obfuscation constant degree multilinear maps arithmetic functional encryption
2016/12/7
In this work, we propose a variant of functional encryption called projective arithmetic functional encryption (PAFE). Roughly speaking, our notion is like functional encryption for arithmetic circuit...
国际学术会议“Workshop on Weighted Projective Spaces and Representation Theory”在中国科学技术大学召开(图)
Workshop on Weighted Projective Spaces and Representation Theory 中国科学技术大学
2016/3/24
为促进加权射影空间与代数表示理论方面的前沿学术交流,2016年3月5日,国际学术会议“Workshop on Weighted Projective Spaces and Representation Theory”在中国科学技术大学数学科学学院召开。与会代表四十余人,包括著名代数学家Osamu Iyama、Henning Krause、Helmut Lenzing和Claus Michael R...
Smooth projective hashing has proven to be an extremely
useful primitive, in particular when used in conjunction with commitments
to provide implicit decommitment. This has lead to applications
pro...