搜索结果: 1-10 共查到“军事学 Abstract”相关记录10条 . 查询时间(0.031 秒)
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
MPC with preprocessing correlated randomness optimal round complexity
2019/9/16
We present preprocessing-MPC schemes of arithmetic functions with optimal round complexity, function-independent correlated randomness, and communication and space complexities that grow linearly with...
The presented work continues the line of recent distributed computing community efforts dedicated to the theoretical aspects of blockchains. This paper is the first to specify blockchains as a composi...
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Cryptocurrency Blockchain Validator-Redeemer Scripts
2018/5/23
In [1], an abstract accounting model for UTXO-based cryptocurrencies has been presented. However, that model considered only the simplest kind of transaction (known in Bitcoin as pay-to-pubkey-hash) a...
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Lattice-Based Cryptography Zero-Knowledge Arguments of Knowledge Privacy-Preserving Protocol
2017/8/17
In an accountable anonymous system, a user is guaranteed anonymity and unlinkability unless some well-defined condition is met. A line of research focus on schemes that do not rely on any trusted thir...
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
applications encrypted computation
2016/1/26
The rapid expansion and increased popularity of cloud computing comes with no shortage of privacy
concerns about outsourcing computation to semi-trusted parties. Leveraging the power of encryption, i...
Tamper-proof devices are pretty powerful. They typically make security applications
simpler (provided that the tamper-proof assumption is not violated). For application
requiring privacy, we observe...
NESHA-256, NEw 256-bit Secure Hash Algorithm(Extended Abstract)
Hash function NIST Diffusion layer
2009/6/11
In this paper, we introduce a new dedicated 256-bit hash function:
NESHA-256. The recently contest for hash functions held by NIST, motivates
us to design the new hash function which has a parallel ...
On the Secure Obfuscation of Deterministic Finite Automata(Extended Abstract)
Obfuscation deterministic finite automata state machines
2009/6/4
In this paper, we show how to construct secure obfuscation for Deterministic Finite Au-
tomata, assuming non-uniformly strong one-way functions exist. We revisit the software protec-
tion approaches...
Lai-Massey Scheme and Quasi-Feistel Networks (Extended Abstract)
Lai-Massey scheme Feistel network Luby-Rackoff
2008/5/29
We introduce the notion of quasi-Feistel network, which is generalization of the
Feistel network, and contains the Lai-Massey scheme as an instance.
Fuzzy Private Matching (Extended Abstract)
fuzzy matching secure 2-party computation secret sharing
2008/5/28
In the private matching problem, a client and a
server each hold a set of n input elements. The client wants to
privately compute the intersection of these two sets: he learns
which elements he has...