>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 T 1-Theorem相关记录515条 . 查询时间(0.171 秒)
This result follows from a more general theory of interactive average-case complexity, and in particular, a novel round-collapse theorem for computationally-sound protocols, analogous to Babai-Moran's...
Soundness amplification is a central problem in the study of interactive protocols. While ``natural'' parallel repetition transformation is known to reduce the soundness error of some special cases of...
In recent years, privacy enhancing technologies have gained tremendous momentum and they are expected to keep a sustained importance. Quantifying the degree of privacy offered by any mechanism working...
Since (t,n)(t,n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and Bloom presented a (t,n)(t,...
Multi-Theorem Preprocessing NIZKs from Lattices     NIZK  CRS       2018/3/23
Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography. Numerous NIZK constructions are known in both the random oracle and the common reference string (CRS) models. In th...
In the area of distributed graph algorithms a number of network's entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortunately, an inherent ...
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem.
I present what might seem to be a local, deterministic model of the EPR-Bohm experiment, inspired by recent work by Joy Christian, that appears at first blush to be in tension with Bell-type theorems....
In this paper we attempt to physically interpret the Modal Kochen-Specker (MKS) theorem. In order to do so, we analyze the features of the possible properties about quantum systems arising from the el...
In a recent paper James Owen Weatherall has attempted a simple local-deterministic model for the EPR-Bohm correlation and speculated about why his model fails when my counterexample to Bell's theorem ...
The existence of Almost Perfect Non-linear (APN) permutations operating on an even number of bits has been a long standing open question until Dillon et al., who work for the NSA, provided an exampl...
In axiomatic approaches to expert opinion aggregation, so-called independence conditions have been ubiquitous. Such conditions dictate that the group value assigned to each decision variable should de...
I identify a number of errors in Richard Gill's purported refutation of my disproof of Bell's theorem. In particular, I point out that his central argument is based, not only on a rather trivial misre...
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We focus on the problem of optimizing the obfuscation of Boolean formulas and branching programs – thi...
We show that the step “modulo the degree-n field generating irreducible polynomial” in the classical definition of the GF(2^n) multiplication operation can be avoided. This leads to an alternative rep...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...