搜索结果: 1-15 共查到“军事学 Probabilistic”相关记录31条 . 查询时间(0.026 秒)
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Predicate Encryption Bilinear Maps Probabilistic Rank
2019/9/19
In predicate encryption for a function ff, an authority can create ciphertexts and secret keys which are associated with `attributes'. A user with decryption key KyKy corresponding to attribute yy can...
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Probabilistic Counting Differential Privacy Randomized Response
2019/7/15
Data minimization has become a paradigm to address privacy concerns when collecting and storing personal data. In this paper we present two new approaches, RSTxFM and RRTxFM, to estimate the cardinali...
Symbolic Side-Channel Analysis for Probabilistic Programs
Side-Channel Attacks Quantitative Information Flow Symbolic Execution
2018/4/11
In this paper we describe symbolic side-channel analysis techniques for detecting and quantifying information leakage, given in terms of Shannon and Min Entropy. Measuring the precise leakage is chall...
Approximate and Probabilistic Differential Privacy Definitions
differential privacy foundations
2018/3/23
This technical report discusses three subtleties related to the widely used notion of differential privacy (DP). First, we discuss how the choice of a distinguisher influences the privacy notion and w...
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of prot...
We offer a probabilistic solution of Yao's millionaires' problem that gives correct answer with probability (slightly) less than 1 but on the positive side, this solution does not use any one-way func...
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
secure multi-party computation parallel composition broadcast
2017/4/27
An important benchmark for multi-party computation protocols (MPC) is their round complexity. For several important MPC tasks, (tight) lower bounds on the round complexity are known. However, for some...
A Probabilistic Baby-Step Giant-Step Algorithm
Discrete logarithm problem baby-step giant-step algorithm NIST curves over prime fields
2017/2/20
In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logar...
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
MAC secret-key cryptography
2016/12/8
Probabilistic MAC (message authentication code) is an alternative choice for a stateful MAC where maintaining internal state may be difficult or unsafe. Usually tag of a probabilistic MAC consists of ...
On Probabilistic Checking in Perfect Zero Knowledge
probabilistically checkable proofs interactive proofs
2016/12/8
Our constructions rely on *succinct* simulators that enable us to "simulate beyond NP", achieving exponential savings in efficiency over [BCGV16]. These simulators crucially rely on solving a problem ...
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n
Stream ciphers fast algebraic attacks time complexity
2016/7/7
Although several methods for estimating the resistance of a random Boolean function against (fast) algebraic attacks were proposed, these methods are usually infeasible in practice for relative large ...
Probabilistic Termination and Composability of Cryptographic Protocols
probabilistic termination Universal Composition cryptographic protocol
2016/4/6
When analyzing the round complexity of multi-party cryptographic protocols, one often overlooks the fact that underlying resources, such as a broadcast channel, can be by themselves expensive to imple...
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Boolean Function Grain v1 Grain-128a
2016/1/8
In 2005, Hell, Johansson and Meier submitted a stream cipher proposal named Grain
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the
hardware category...
This paper studies the question of how to define, construct, and use obfuscators for
probabilistic programs. Such obfuscators compile a possibly randomized program into a
deterministic one, which ac...
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Differential Attack Fault Attack Grain Family
2015/12/30
Differential Fault Attack (DFA) has received serious attention in cryptographic literature
and very recently such attacks have been mounted against several popular stream ciphers for example
Grain v...