搜索结果: 1-15 共查到“军队指挥学 Improvements”相关记录25条 . 查询时间(0.071 秒)
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Voting Everlasting Privacy Zero Knowledge Proofs
2019/8/8
Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with...
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
ring learning with errors learning with errors Ring-LWE
2019/3/1
We provide several reductions of Ring-LWE problems to smaller Ring-LWE problems in the presence of samples of a restricted form (i.e. (a,b) such that a is restricted to a subring, or multiplicative co...
Security Analysis for Randomness Improvements for Security Protocols
cryptographic protocols Security Protocols
2018/11/2
Many cryptographic mechanisms depend on the availability of secure random numbers. In practice, the sources of random numbers can be unreliable for many reasons. There exist ways to improve the reliab...
Function Secret Sharing: Improvements and Extensions
unction secret sharing private information retrieval secure multiparty computation
2018/8/2
FSS schemes are useful for applications that involve privately reading from or writing to distributed databases while minimizing the amount of communication. These include different flavors of private...
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Random oracle model bounded retrieval model big-key cryptography
2018/3/5
Towards advancing the use of BIG keys as a practical defense against key exfiltration, this paper provides efficiency improvements for cryptographic schemes in the bounded retrieval model (BRM). We id...
Improvements for Finding Impossible Differentials of Block Cipher Structures
block cipher cryptanalysis impossible differential
2017/12/19
In this paper we improve Wu and Wang's method for finding impossible differentials of block cipher structures. This improvement is more general than Wu and Wang's method that it can find more impossib...
Improvements to the Linear Layer of LowMC: A Faster Picnic
LowMC efficient implementation Picnic
2017/11/28
Picnic is a practical approach to digital signatures where the security is largely based on the existence of a one-way function, and the signature size strongly depends on the number of multiplication...
Improvements for Gate-Hiding Garbled Circuits
garbled circuits Yao's protocol private function evaluation
2017/10/9
Garbled circuits have been highly optimized for practice over the last several years. Today's most efficient constructions treat different types of gates (e.g., AND vs XOR) differently; as such, they ...
Improvements on the Individual Logarithm Step in exTNFS
Discrete logarithm problem extended tower number field sieve individual logarithm
2016/7/28
The hardness of discrete logarithm problem over finite fields is the foundation of many cryptographic protocols. When the characteristic of the finite field is medium or large, the state-of-art algori...
Valiant's Universal Circuit: Improvements, Implementation, and Applications
universal circuits implementation Private Function Evaluation
2016/1/27
A Universal Circuit (UC) is a circuit that can simulate any
circuit of a maximum size, given its description as input. In this work, we
look back at Valiant’s universal circuit construction from Val...
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Multiparty computation Constant-overhead Boolean Circuit
2016/1/23
Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boole...
Constants Count: Practical Improvements to Oblivious RAM
cryptographic protocols significantly simpler analysis
2016/1/5
Oblivious RAM (ORAM) is a cryptographic primitive that hides memory access patterns as seen by untrusted storage. This paper proposes Ring ORAM, the most bandwidth-efficient ORAM scheme for the small ...
Performance and Security Improvements for Tor: A Survey
Privacy-enhancing technologies anonymity networks performance
2016/1/3
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a
daily basis using a growing number of volunteer-run routers. Since its deployment in 2003,...
Modular Inversion Hidden Number Problem -- Correction and Improvements
Correction Improvements
2015/12/24
The Modular Inversion Hidden Number Problem (MIHNP) was introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001 (BHH'01). They provided two heuristics - in Method I, two-third of the output ...
Encryption Performance Improvements of the Paillier Cryptosystem
Paillier homomorphic encryption performance improvements
2015/12/23
Homomorphic encryption methods provide a way to outsource
computations to the cloud while protecting the confidentiality of
the data. In order to deal with the large and growing data sets that are
...