搜索结果: 1-15 共查到“军队指挥学 Delegation”相关记录41条 . 查询时间(0.183 秒)
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Filter Permutator FLIP Homomorphic Encryption
2019/5/14
Motivated by the application of delegating computation, we revisit the design of filter permutators as a general approach to build stream ciphers that can be efficiently evaluated in a fully homomorph...
We construct a publicly verifiable non-interactive delegation scheme for log-space uniform bounded depth computations in the common reference string (CRS) model, where the CRS is long (as long as the ...
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Verifiable and secure delegation modular exponentiations cloud security
2018/7/9
Security protocols using public-key cryptography often requires large number of costly modular exponentiations (MEs). With the proliferation of resource-constrained (mobile) devices and advancements i...
Monotone Batch NP-Delegation with Applications to Access Control
delegation witness indistinguishability access control
2018/5/2
Consider an access policy for some resource which only allows access to users of the system who own a certain set of attributes. Specifically, we consider the case where such an access structure is de...
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Credential delegation access control trusted execution environment
2018/3/7
We introduce a new concept called brokered delegation. Brokered delegation allows users to flexibly delegate credentials and rights for a range of service providers to other users and third parties. W...
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
delegation non-interactive succinct arguments
2018/1/2
Our scheme consists of only two messages and has adaptive soundness, assuming the existence of a sub-exponentially secure private information retrieval (PIR) scheme, which can be instantiated under st...
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Verifiable and secure delegation bilinear maps cryptographic protocols
2017/12/6
We address the problem of secure and verifiable delegation of general pairing computation. We first analyze some recently proposed pairing delegation schemes and present several attacks on their secur...
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Identity-Based Revocation Delegation Attribute-Based Encryption
2017/11/20
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
Digital Liquid Democracy: How to Vote Your Delegation Statement
Universal Composability Decentralized Autonomous Organization
2017/6/28
The existing (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in collective decision making. To address this iss...
Non-Interactive RAM and Batch NP Delegation from any PIR
Delegation No-Signaling Adaptive Soundness
2016/5/17
We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational...
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Attribute-Based Encryption Semi-Adaptive Security Delegation
2016/1/9
We consider semi-adaptive security for attribute-based encryption, where the adversary specifies the
challenge attribute vector after it sees the public parameters but before it makes any secret key ...
Efficient and Secure Delegation of Group Exponentiation to a Single Server
cryptographic protocols Single Server
2016/1/3
We consider the problem of delegating computation of group operations from a computationally weaker client holding an input and a description of a function, to a {\em single} computationally stronger ...
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
cryptographic protocols zero-knowledge proofs
2016/1/3
Since their introduction in 1985, by Goldwasser, Micali and Rackoff, followed by Feige, Fiat
and Shamir, zero-knowledge proofs have played a significant role in modern cryptography: they allow a
par...
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Proxy signatures digital signatures
2014/3/10
Proxy signatures allow an entity (the delegator) to delegate his signing capabilities to other entities (called proxies), who can then produce signatures on behalf of the delegator. Typically, a deleg...
Verifiable Delegation of Computation on Outsourced Data
Verifiable Delegation of Computation CloudComputing
2014/3/11
We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion o...