Efficient Protocols for Set Membership and Range Proofs
Related publications (58)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this thesis, we present a theory of value for the design and analysis of service ecosystems. The theory is based on general systems thinking. The concept of a system is used for relating knowledge from different disciplines (such as software engineering ...
Informed by longstanding artistic practice, this doctoral thesis approaches entanglements of Swiss coloniality in Brazil and Switzerland under the lens of land, archive, and visuality. The enduring legacies of imperial capitalism in the former Colonia Leop ...
With the application requirements of wireless technology in implantable bioelectronics, knowledge of the fundamental limits for implanted antennas becomes critical. In this work, we investigated the variation of maximum power density within simplified body ...
Action-oriented, transformative, and transdisciplinary approaches are increasingly heralded as promising tools that enable researchers not only to produce new knowledge about a situation, but also to actively engage in tackling it; however, such approaches ...
In a geotechnical excavation, back analyses are routinely performed using the measured field responses to derive the material parameter values for the different soil layers present at the site. For the purpose of back analyses, the engineers will usually m ...
With self-sovereign identity (SSI), we stand at a crossroads that is leading society to a new kind of digital identity. Under this new paradigm, users no longer have to remember a username and a password; instead they gain full power on the information tha ...
We prove an identity relating the permanent of a rank 2 matrix and the determinants of its Hadamard powers. When viewed in the right way, the resulting formula looks strikingly similar to an identity of Carlitz and Levine, suggesting the possibility that t ...
Interactive oracle proofs (IOPs) are a multi-round generalization of probabilistically checkable proofs that play a fundamental role in the construction of efficient cryptographic proofs. We present an IOP that simultaneously achieves the properties of zer ...
Research on founder identity has significantly advanced our understanding of entrepreneurship and related literatures. By departing from the widely held-though often implicit-assumption that culture defines the parameters of identity formation, this paper ...