搜索结果: 1-10 共查到“军事学 Monotone”相关记录10条 . 查询时间(0.314 秒)
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
MPC cryptographic protocols
2018/5/22
Recent improvements in the state-of-the-art of MPC for non-full-threshold access structures introduced the idea of using a collision-resistant hash functions and redundancy in the secret-sharing schem...
Monotone Batch NP-Delegation with Applications to Access Control
delegation witness indistinguishability access control
2018/5/2
Consider an access policy for some resource which only allows access to users of the system who own a certain set of attributes. Specifically, we consider the case where such an access structure is de...
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
secondary-key public-key cryptography
2016/5/24
We propose a concrete procedure of a \Sgm-protocol to prove knowledge that satisfies a monotone predicate. Inspired by the high-level proposal by Cramer, Damg\r{a}rd and Schoenmakers at CRYPTO '94, we...
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
cryptographic protocols computational secret-sharing
2016/2/24
We propose a computationally secure and non-interactive verifiable secret sharing scheme
that can be efficiently constructed from any monotone Boolean circuit. By non-interactive we mean that
the de...
On the nonlinearity of monotone Boolean functions
Boolean functions monotone functions Walsh–Hadamard spectrum
2016/2/23
We first prove the truthfulness of a conjecture on the nonlinearity of
monotone Boolean functions in even dimension, proposed in the recent paper “Cryptographic
properties of monotone Boolean functi...
Multiplicative monotone span program is one of the important tools to realize secure multiparty computation. It is essential to construct multiplicative monotone span programs for secure multiparty co...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
attribute-based signatures multi-authority system non-monotone predicates
2012/6/14
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
An extended abstract was presented at Public Key Cryptography -- PKC 2011 LNCS 6571 pages 35-52. This is the full paper.
2012/3/20
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
attribute-based signatures multi-authority system non-monotone predicates
2012/8/28
This paper presents a fully secure (adaptive-predicate unforgeable and private) attribute-based signature (ABS) scheme in the standard model. The security of the proposed ABS scheme is proven under st...
In this paper we provide several known and one new constructions
of new linear secret sharing schemes (LSSS) from existing
ones. This constructions are well-suited for didactic purposes, which is
a...