Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1418320 - MaRDI portal

scientific article; zbMATH DE number 1418320

From MaRDI portal
Publication:4941882

zbMath0942.94004MaRDI QIDQ4941882

Ravi Kumar, Amit Sahai, Sridhar Rajagopalan

Publication date: 19 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (23)

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreSeparation and WitnessesHomomorphic signatures with sublinear public keys via asymmetric programmable hash functionsLinear Time Constructions of Some $$d$$-Restriction ProblemsA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelAttribute-Based Broadcast Encryption Scheme Made EfficientNew combinatorial structures with applications to efficient group testing with inhibitorsBounds and algorithms for generalized superimposed codesA New Design of Online/Offline Signatures Based on LatticeLattice-based programmable hash functions and applicationsRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreConstructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels.Generalized cover-free families.Fighting Pirates 2.0Predicate signatures from pair encodings via dual system proof techniqueUnion-intersection-bounded families and their applicationsLow-weight superimposed codes and related combinatorial structures: bounds and applicationsAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityVerifiable random functions: relations to identity-based key encapsulation and new constructionsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesUnnamed ItemA public-key traitor tracing scheme with revocation using dynamic sharesMulti-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing




This page was built for publication: