搜索结果: 1-13 共查到“Homomorphism”相关记录13条 . 查询时间(0.046 秒)
Homomorphism learning problems and its applications to public-key cryptography
Learning With Errors isogenies non-commutative cryptography
2019/6/19
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
Multivariate Cryptography stable transformation groups and semigroups decomposition problem of nonlinear multivariate map into given generators
2019/6/3
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups, semigroups and non-commutative rings. Its inter-section with Multivariate cryptography contains...
Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
cryptographic protocols UC
2018/11/5
Homomorphic universally composable (UC) commitments allow for the sender to reveal the result of additions and multiplications of values contained in commitments without revealing the values themselve...
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism
foundations digital signatures
2016/12/10
Homomorphic signatures (HS) allow evaluation of signed messages by producing a signature on a function of messages signed by the same key. Motivated by the vast potential of applications, we initiate ...
On the Impossibility of Merkle Merge Homomorphism
hash functions digital signature homomorphism
2016/6/17
This work considers a theoretic problem of merging the digests of two ordered lists “homomorphically.” This theoretic problem has potential applications to efficient and verifiable data outsourcing, w...
The image of the Lepowsky homomorphism for the group $F_4$
the Lepowsky homomorphism for group Representation Theory
2011/8/24
Abstract: Let $G_o$ be a semisimple Lie group, let $K_o$ be a maximal compact subgroup of $G_o$ and let $\mathfrak{k}\subset\mathfrak{g}$ denote the complexification of their Lie algebras. Let $G$ be ...
Additive groups and semigroups of matrices on which the exponential is a homomorphism
matrix pencils commuting exponentials property L
2011/2/24
Let G be a subgroup of (Mn(C),+). We show that M 7→ exp(M)is a group homomorphism from G to (GLn(C),×) if and only if G con-sists of commuting matrices. We also prove that if S is a sub-semigroup of (...
On the Relative Weak Asymptotic Homomorphism Property for Pairs of Groups von Neumann Algebras
the Relative Weak Asymptotic Homomorphism Property Pairs Groups von Neumann Algebras
2010/11/9
We provide a direct and elementary proof of the equivalence between the weak asymptotic homomorphism property for the pair of group von Neumann algebras $L(H)\subset L(G)$ and the embedding into $H$ ...
From Similarity to Homomorphism: Toward a Pragmatic Account of Representation in Art and Science, 1880-1914
Representative practices art and science iconicity homomorphism
2009/11/18
The years 1880-1914 were a time of intense experimentation in the visual arts. Representative conventions became variable, and artists deliberately departed from a concept of depiction considered as p...
From Similarity to Homomorphism: Toward a Pragmatic Account of Representation in Art and Science, 1880-1914
Representative practices art science iconicity
2009/9/11
The years 1880-1914 were a time of intense experimentation in the visual arts. Representative conventions became variable, and artists deliberately departed from a concept of depiction considered as p...
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomorphism
Privacy homomorphism Encrypted Data Database Security
2009/4/10
We propose a cryptanalysis of the original Domingo-Ferrer's alge-
braic privacy homomorphism. We show that the scheme over Zn can be broken by
d + 1 known plaintexts in O(d3 log2 n) time when it has...
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
Zero-Knowledge Proofs Mix-nets Secret Shares ElGamal Modular Homomorphism
2009/1/20
Mix-nets can be used to shuffle vectors of shared secrets. This operation can be an important building block for solving combinatorial problems where constraints depend on secrets of dierent particip...
We define approximate separation and extension properties of a Banach lattice and study the relation between these and topological fullness of the ideal centre. Banach lattices with topologically full...