搜索结果: 1-15 共查到“log P”相关记录166条 . 查询时间(0.062 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Asymptotic log-concavity of dominant lower Bruhat intervals
显性 Bruhat区间 渐近对数凹性
2023/11/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:On the Log-Brunn-Minkowski inequality
对数 布伦 闵可夫斯基不等式
2023/4/17
Efficient zero-knowledge arguments in the discrete log setting, revisited
zero-knowledge argument quadratic equations arithmetic circuit satisfiability
2019/8/20
This work revisits zero-knowledge proofs in the discrete logarithm setting. First, we identify and carve out basic techniques (partly being used implicitly before) to optimize proofs in this setting. ...
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Ring Confidential Transactions Log-size Proofs
2019/5/31
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Zero-Knowledge Proofs Bulletproofs FHE
2019/1/26
In applications of fully-homomorphic encryption (FHE) that involve computation on encryptions produced by several users, it is important that each user proves that her input is indeed well-formed. Thi...
了解叶酸增补认知对叶酸服用的影响,为妇幼保健部门提高叶酸增补干预效率、改善出生结局提供数据支撑。 方法 分析2016年7 — 8月在陕西省10个地级市和杨凌示范区开展的横断面调查数据,采用问卷调查方法对1 495名近3年有过生育史或正在怀孕的育龄妇女围孕期叶酸服用状况和叶酸增补认知情况进行调查,采用log-binomial模型分析叶酸增补认知对叶酸服用状况的影响,估计现患比(prevalen...
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Homomorphic secret sharing share conversion fully homomorphic encryption
2018/8/10
The distributed discrete logarithm (DDL) problem was introduced by Boyle et al. at CRYPTO 2016. A protocol solving this problem was the main tool used in the share conversion procedure of their homomo...
Log in 提交 IUTAM Symposium on Acoustic/elastic metamaterials, their design and applications
Login Submit IUTAM Seminar Sound waves Elastic material
2017/12/13
The last decade has witnessed an increasing interest in the study of acoustic/elastic metamaterials and their potential engineering applications. Acoustic/elastic metamaterials are a class of composit...
LIDAR-INCORPORATED TRAFFIC SIGN DETECTION FROM VIDEO LOG IMAGES OF MOBILE MAPPING SYSTEM
Traffic Sign Detection Mobile Mapping System RANSAC Random Forest Camshift Kalman Filtering
2016/7/5
Mobile Mapping System (MMS) simultaneously collects the Lidar points and video log images in a scenario with the laser profiler and digital camera. Besides the textural details of video log images, it...
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
Sigma-protocol zero-knowledge argument arithmetic circuit
2016/3/9
We provide a zero-knowledge argument for arithmetic circuit
satisfiability with a communication complexity that grows logarithmically
in the size of the circuit. The round complexity is also logarit...
The goal of leakage-resilient cryptography is to construct
cryptographic algorithms that are secure even if the devices on which
they are implemented leak information to the adversary. One of the ma...
In this report we describe our efforts in analysing log files produced by the Estonian i-voting system in the KOV2013, EP2014 and RK2015 elections in combination with other information available, so a...
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Boolean functions Fourier and Walsh-Hadamard transforms entropy
2016/1/26
We consider the Fourier Entropy-Influence (FEI) conjecture in
the context of cryptographic Boolean functions. We show that the FEI conjecture
is true for the functions satisfying the strict avalanch...
Wide-Coverage Efficient Statistical Parsing with CCG and Log-Linear Models
Wide-Coverage Statistical Parsing CCG Log-Linear Models
2015/9/2
This article describes a number of log-linear parsing models for an automatically extracted lexicalized grammar. The models are “full” parsing models in the sense that probabilities are defined for co...