Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Learning the Coefficients: A Presentable Version of Border Complexity and Applications to Circuit Factoring
STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of ComputingPages 130–140https://doi.org/10.1145/3618260.3649743The border, or the approximative, model of algebraic computation (VP) is quite popular due to the Geometric Complexity Theory (GCT) approach to P≠NP conjecture, and its complex analytic origins. On the flip side, the definition of the border is ...
- research-articleMay 2024
On the Success Probability of Quantum Order Finding
ACM Transactions on Quantum Computing (TQC), Volume 5, Issue 2Article No.: 11, Pages 1–40https://doi.org/10.1145/3655026We prove a lower bound on the probability of Shor’s order-finding algorithm successfully recovering the order r in a single run. The bound implies that by performing two limited searches in the classical post-processing part of the algorithm, a high ...
- research-articleNovember 2023
The Value of Smart Contract in Trade Finance
Manufacturing & Service Operations Management (INFORMS-MSOM), Volume 25, Issue 6Pages 2056–2073https://doi.org/10.1287/msom.2022.1126Problem definition: Smart contract improves the supply chain efficiency by enabling the supplier’s commitment to postshipment financing decisions, which mitigates the bank’s lending risk exposure and thereby reduces the financing cost. This paper ...
- research-articleOctober 2019
- articleMarch 2019
Factoring on a quantum annealing computer
This paper is about quantum factoring all integers in an interval. Our goal is to be able to factor all positive integers N < 1,000. We reached this goal on a D-Wave 2000 qubit processor by minimizing (N – (p × q))2 by using one routine that calls the ...
-
- research-articleNovember 2015
Reliability Evaluation of Imperfect K-Terminal Stochastic Networks using Polygon-to Chain and Series-parallel Reductions
Q2SWinet '15: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile NetworksPages 115–122https://doi.org/10.1145/2815317.2815336In this paper, we propose a mathematical model for determining the exact value of the reliability of Mobile Ad hoc (MANET) and Wireless Sensor (WSN) Networks which are considered in this research as a collection of Imperfect Stochastic Networks (ISN). ...
- research-articleJune 2015
Factors of low individual degree polynomials
In [8], Kaltofen proved the remarkable fact that multivariate polynomial factorization can be done efficiently, in randomized polynomial time. Still, more than twenty years after Kaltofen's work, many questions remain unanswered regarding the complexity ...
- ArticleDecember 2013
Recovering Private Keys Generated with Weak PRNGs
IMACC 2013: Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308Pages 158–172https://doi.org/10.1007/978-3-642-45239-0_10Suppose that the private key of discrete logarithm-based or factoring-based public-key primitive is obtained by concatenating the outputs of a linear congruential generator. How seriously is the scheme weakened as a result__ __
While linear congruential ...
- ArticleOctober 2013
Factoring-Based Proxy Re-Encryption Schemes
ProvSec 2013: Proceedings of the 7th International Conference on Provable Security - Volume 8209Pages 309–329https://doi.org/10.1007/978-3-642-41227-1_18Proxy re-encryption (PRE) realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob, and cannot learn anything about the ...
- ArticleOctober 2013
How to Remove the Exponent GCD in HK09
ProvSec 2013: Proceedings of the 7th International Conference on Provable Security - Volume 8209Pages 239–248https://doi.org/10.1007/978-3-642-41227-1_14To improve the decapsulation efficiency of HK09 (proposed by Hofheinz and Kiltz in Eurocrypt 2009), we propose a new skill to remove the exponent GCD operation. In the proposed scheme, the decapsulation efficiency is improved by 38.9% (instantiated over ...
- ArticleSeptember 2013
Public Verifiable Key Encapsulation Mechanism under Factoring
INCOS '13: Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative SystemsPages 586–590https://doi.org/10.1109/INCoS.2013.108The cipher text consistency check that can be implemented publicly has practical significance, and it is always an interested studying aspect to construct cryptographic algorithm without pairings in the field of cryptographic. On the other hand, it is ...
- articleJanuary 2013
A Memory-efficient Bounding Algorithm for the Two-terminal Reliability Problem
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 291Pages 15–25https://doi.org/10.1016/j.entcs.2012.11.015The terminal-pair reliability problem, i.e. the problem of determining the probability that there exists at least one path of working edges connecting the terminal nodes, is known to be NP-hard. Thus, bounding algorithms are used to cope with large ...
- ArticleSeptember 2012
Additively homomorphic encryption with a double decryption mechanism, revisited
ISC'12: Proceedings of the 15th international conference on Information SecurityPages 242–257https://doi.org/10.1007/978-3-642-33383-5_15We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decrypt all properly formed ciphertexts by ...
- ArticleApril 2012
Improved efficiency of chosen ciphertext secure encryption from factoring
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and ExperiencePages 34–45https://doi.org/10.1007/978-3-642-29101-2_3We propose a new variant of HK09 (proposed by Hofheinz and Kiltz in Eurocrypt 2009) which improves the decapsulation efficiency at the price of a slightly increased key size. Compared with the original HK09 scheme the decapsulation efficiency is ...
- ArticleNovember 2011
Improved tradeoff between encapsulation and decapsulation of HK09
Inscrypt'11: Proceedings of the 7th international conference on Information Security and CryptologyPages 131–141https://doi.org/10.1007/978-3-642-34704-7_11We propose a new variant of HK09 (Proposed by Hofheinz and Kiltz in Eurocrypt2009) which simplifies the decapsulation. Our result is a tradeoff between the efficiency of encapsulation and decapsulation. Compared with original HK09 the efficiency of ...
- ArticleOctober 2011
Efficient fail-stop signatures from the factoring assumption
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. These signatures were originally proposed to provide information-theoretic-based security against forgeries. In contrast to classical signature schemes, in ...
- ArticleAugust 2011
Considering Dependent Components in the Terminal Pair Reliability Problem
ARES '11: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and SecurityPages 415–422https://doi.org/10.1109/ARES.2011.91The determination of the reliability value for technical systems whose components are subjected to random failure possesses a wide range of applicability, e.g. in data communication networks, computer architectures and electrical power networks. The ...
- ArticleJuly 2011
Provably secure key assignment schemes from factoring
ACISP'11: Proceedings of the 16th Australasian conference on Information security and privacyPages 292–309We provide constructions for key assignment schemes that are provably secure under the factoring assumption in the standard model. Our first construction is for simple "chain" hierarchies, and achieves security against key recovery attacks with a tight ...
- articleJanuary 2011
The Modified Signature Scheme Based on Factoring and Discrete Logarithms
Information Security Journal: A Global Perspective (ISJGP), Volume 20, Issue 4-5Pages 245–249https://doi.org/10.1080/19393555.2011.607221Laih and Kuo developed two highly secure and efficient signature schemes based on factoring and discrete logarithms. Unfortunately, their schemes require many keys for signing document and verifying signature. Li, Tzeng, and Hwang improved one of their ...
- ArticleOctober 2010
A New SETUP for Factoring Based Algorithms
IIH-MSP '10: Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 200–203https://doi.org/10.1109/IIHMSP.2010.57When using cryptography, there is frequently the misconception that if the keys are properly stored and are not given away, then the user is safe, if he uses a strong encryption algorithm. SETUPs exploit this common misconception, be embedding secret ...