Anonymous Public-Key Encryption Sample Clauses

Anonymous Public-Key Encryption. We recall the definition of anonymous public-key encryption from [2]. Definition 28 A public-key encryption scheme PE = (G, K, E , D) consists of four algorithms: • Common-key generation: I = G(1κ), where I is a common key, which might be just the security parameter κ or include some additional information. • Key generation: (pk, sk) = K(I), takes as input the common key I and returns a pair of keys, where pk is the public key and sk is the secret key. • Encryption: c = Epk(m; r) denotes an encryption with key pk of a plaintext m with randomness
AutoNDA by SimpleDocs
Anonymous Public-Key Encryption. We recall the definition of anonymous public-key encryption from [3]. 9. A CPA-secure public-key encryption scheme PE = (KGen, Enc, Dec)
Anonymous Public-Key Encryption. We recall the definition of anonymous public-key encryption from [3]. Definition 35 A CPA-secure public-key encryption scheme PE = (KGen, Enc, Dec) is anony- mous if the following is negligible for any ppt adversary A: (pk , sk ) KGen(1n); (pk , sk ) KGen(1n); m ← A(pk , pk ); b ← {0, 1}; c ← Encpk (m) : A(c) = b − 2 . The claims regarding the communication complexity, size of the setup, and the number MPC of invocations of Byzantine agreement follow because Πl runs a VACS protocol with l-output quality and inputs of length O(I · poly(n)) in step 2; |C| = O(n) (in expectation) reliable broadcast protocols on inputs of length O(O · poly(n)) in step 4; and a reliable consensus protocol on inputs of length O in step 5. To prove security of the protocol, we define a simulator S that works as follows: Setup: S generates the setup honestly, with two exceptions: • S uses the TFHE simulator to generate the TFHE public key, t − 1 decryption keys {dki}, and n + 1 ciphertexts c1, . . . , cn, crand. • S generates the CRS for the UC-NIZK proof system using the corresponding simulator. In particular, this defines a set C of the parties. Corruptions: Whenever A corrupts a party, S gives A the state held by that party at that point in time. Let S denote the set of parties that A corrupts that are (1) in C and (2) corrupted before executing step 2 of the protocol. If |S| ≥ t the simulator aborts (call this event abort1). Otherwise, when A corrupts the ith party in S, it is given dki as part of that party’s state. If A corrupts a party Pi before Pi has begun executing step 1 of the protocol, then S corrupts Pi in the ideal world to obtain Pi’s input (which it then gives to A along with Pi’s state). When A corrupts a party at any other point in the protocol, S delays its corruption of that party until after S sends XxxxXxx to the trusted party (as described below).

Related to Anonymous Public-Key Encryption

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Root-­‐zone Information Publication ICANN’s publication of root-­‐zone contact information for the TLD will include Registry Operator and its administrative and technical contacts. Any request to modify the contact information for the Registry Operator must be made in the format specified from time to time by ICANN at xxxx://xxx.xxxx.xxx/domains/root/.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

  • zone Information Publication ICANN’s publication of root-zone contact information for the TLD will include Registry Operator and its administrative and technical contacts. Any request to modify the contact information for the Registry Operator must be made in the format specified from time to time by ICANN at xxxx://xxx.xxxx.xxx/domains/root/.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Public/Private Information The Borrower shall cooperate with the Administrative Agent in connection with the publication of certain materials and/or information provided by or on behalf of the Borrower. Documents required to be delivered pursuant to the Loan Documents shall be delivered by or on behalf of the Borrower to the Administrative Agent and the Lenders (collectively, “Information Materials”) pursuant to this Article and the Borrower shall designate Information Materials (a) that are either available to the public or not material with respect to the Borrower and its Subsidiaries or any of their respective securities for purposes of United States federal and state securities laws, as “Public Information” and (b) that are not Public Information as “Private Information”.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!