نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
We perform a concrete security treatment of digital signature schemes obtained from canonical identification schemes via the Fiat-Shamir transform. If the identification scheme is random selfreducible and satisfies the weakest possible security notion (key-recoverability), then the signature scheme obtained via Fiat-Shamir is unforgeable against chosen-message attacks in the multi-user setting....
We propose a generalized ordered response model that nests the popular Carlson-Parkin (CP) method to quantify household inflation expectations while explicitly control for cross-sectional heterogeneity in the threshold parameters and the variance. By matching qualitative and quantitative data from 1979 to 2012 from the University of Michigan’s Survey of Consumers, we find evidence against the t...
This paper proposes a fuzzy modelling approach oriented to the design of a fuzzy controller for regulating the fresh airflow of a real diesel engine. This strategy has been suggested for enhancing the regulator design that could represent an alternative to the standard embedded BOSCH controller, already implemented in the Engine Control Unit (ECU), without any change to the engine instrumentati...
Biometrics make human identification possible with a sample of a bio-metric trait and an associated database. Classical identification tech-niques lead to privacy concerns. This paper introduces a new method toidentify someone using his biometrics in an encrypted way.Our construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. We apply this error-...
This paper proposes a fuzzy modelling and identification approach oriented to the design of a PI fuzzy controller for regulating both the pitch angle and the reference torque of a wind turbine model. This strategy has been suggested for enhancing the regulator design that could represent an alternative to the standard switching controller, already implemented in the wind turbine test system. Th...
This paper considers two-input, two-output nonlinear adaptive model following control of a 3-DOF (degree-of-freedom) tandem rotor model helicopter. The control performance is studied by real time implementation of the control algorithms in an actual helicopter testbed. Since the decoupling matrix of the model helicopter is singular, the system is not decouplable by static state feedback, and it...
In 1986, Fiat and Shamir proposed a general method for transforming secure -round public-coin identification schemes into digital signature schemes. The idea of the transformation was to replace the random message of the verifier in the identification scheme, with the value of some deterministic“hash” function evaluated on various quantities in the protocol and on the message to be signed. The ...
Article history: Received 1 April 2010 Received in revised form 3 August 2011 Accepted 4 August 2011 Available online 11 August 2011 This paper uses a tri-variate structural VAR with a long-run identification scheme, akin to the Blanchard and Quah method, to identify external and domestic supply and demand shocks in 22 African countries between 1980 and 2005. Domestic supply shocks are found to...
Conventional structural vector autoregressive (SVAR) models with Gaussian errors are not identified, and additional identifying restrictions are typically imposed in applied work. We show that the Gaussian case is an exception in that a SVAR model whose error vector consists of independent non-Gaussian components is, without any additional restrictions, identified and leads to (essentially) uni...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید