搜索结果: 1-7 共查到“军事学 Proximity”相关记录7条 . 查询时间(0.017 秒)
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
SGX TOFU
2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
Faster Privacy-Preserving Location Proximity Schemes
Location Privacy Proximity Secure Computation
2018/7/20
In the last decade, location information became easily obtainable using off-the-shelf mobile devices. This gave a momentum to developing Location Based Services (LBSs) such as location proximity detec...
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
Probabilistically Checkable Proofs Zero-Knowledge Verifiable Secret Sharing
2017/2/28
A probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form "x∈Lx∈L" by querying only fe...
Interactive proofs of proximity (Ergun, Kumar and Rubinfeld, Information & Computation, 2004 and Rothblum, Vadhan and Wigderson, STOC 2013), or IPPs, are interactive proofs in which the verifier runs ...
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very few
distance-bounding protocols, with formal security proofs, have been proposed. In fact, so far only two
p...
Public-key distance bounding schemes are needed to defeat relay attacks in payment systems. So
far, only two such schemes exist, but fail to fully protect against malicious provers. In this paper, we...
Private Proximity Testing on Steroids: An NTRU-based Protocol
Location privacy Cryptographic Protocols Private Equality Testing
2015/12/23
Nowadays, most smartphones come pre-equipped with location
(GPS) sensing capabilities, allowing developers to create a wide variety
of location-aware applications and services. While location awaren...