搜索结果: 1-15 共查到“Universal”相关记录374条 . 查询时间(0.25 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:On Deligne-Beilinson cohomology of the universal K3 surface
泛K3曲面 Deligne-Beilinson 同调
2023/5/15
A universal system for decoding any type of data sent across a network(图)
解码 计算机网络 芯片 半导体技术
2023/6/9
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
succinct arguments universal SRS algebraic holographic proofs
2019/9/19
We present a methodology to construct preprocessing zkSNARKs where the structured reference string (SRS) is universal and updatable. This exploits a novel use of *holography* [Babai et al., STOC 1991]...
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
Efficient and Scalable Universal Circuits
Universal circuit private function evaluation function hiding
2019/4/3
A universal circuit (UC) can be programmed to simulate any circuit up to a given size n by specifying its program inputs. It provides elegant solutions in various application scenarios, e.g., for priv...
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
zero knowledge zk-SNARKs universal SRS
2019/2/27
Zero-knowledge proofs have become an important tool for addressing privacy and scalability concerns in cryptocurrencies and other applications. In many systems each client downloads and verifies every...
Pseudo-Free Families of Computational Universal Algebras
universal algebras families of computational universal algebras pseudo-freeness
2018/12/3
Let ΩΩ be a finite set of operation symbols. We initiate the study of (weakly) pseudo-free families of computational ΩΩ-algebras in arbitrary varieties of ΩΩ-algebras. Most of our results concern (wea...
Universal Proxy Re-Encryption
universal proxy re-encryption proxy re-encryption public-key encryption
2018/11/16
We put forward the notion of universal proxy re-encryption (UPRE). A UPRE scheme enables us to convert a ciphertext under a (delegator) public key of any existing public-key encryption (PKE) scheme in...
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
Universal Circuits Private Function Evaluation Multiparty Computation
2018/11/7
A universal circuit (UC) is a general-purpose circuit that can simulate arbitrary circuits (up to a certain size nn). At STOC 1976 Valiant presented a graph theoretic approach to the construction of U...
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Garbled Circuit Universal Circuit GC framework
2018/9/6
Two-party Secure Function Evaluation (SFE) allows two parties to evaluate a function known to both parties on their private inputs. In some settings, the input of one of the parties is the definition...
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
MergeMAC universal forgery multiple forgeries
2018/9/6
This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. Mer...
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
universal composability secure hardware modules
2018/5/30
We initiate the study of incorporating remotely unhackable hardware modules, such as air-gap switches and data diodes, into the field of multi-party computation. As a result, we are able to construct ...
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
zero-knowledge common reference strings subvertability
2018/3/23
By design, existing (pre-processing) zk-SNARKs embed a secret trapdoor in a relation-dependent common reference strings (CRS). The trapdoor is exploited by a (hypothetical) simulator to prove the sche...
On the Gold Standard for Security of Universal Steganography
Eurocrypt 2018 steganography public-key cryptography
2018/1/31
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persis...
Penn Researchers Establish Universal Signature Fundamental to How Glassy Materials Fail(图)
Penn Researchers Establish Universal Signature Fundamental Glassy Materials Fail
2017/12/18
Dropping a smartphone on its glass screen, which is made of atoms jammed together with no discernible order, could result in it shattering. Unlike metals and other crystalline materials, glass and man...