搜索结果: 1-9 共查到“军事学 interaction”相关记录9条 . 查询时间(0.078 秒)
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Arguments Interactive Proofs
2016/3/18
We are interested in constructing short two-message arguments for various languages, where
the complexity of the verifier is small (e.g. linear in the input size, or even sublinear if it is
coded pr...
Unconditionally Secure Computation with Reduced Interaction
cryptographic protocols complexity
2015/12/29
We study the question of how much interaction is needed for unconditionally secure multiparty computation. We first consider the number of messages that need to be sent to compute a Boolean function w...
Secure Multiparty Computation with General Interaction Patterns
Secure multiparty computation Interactions Obfuscation
2015/12/18
We present a unified framework for studying secure multi-party computation (MPC) with
arbitrarily restricted interaction patterns. Our study generalizes both standard MPC and recent
models for MPC w...
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
cryptographic protocols secure computation
2014/3/13
Halevi, Lindell, and Pinkas (CRYPTO 2011) recently proposed a model for secure computation that captures communication patterns that arise in many practical settings, such as secure computation on the...
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
public-key cryptography / fully homomorphic encryption threshold encryption
2012/6/14
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bob homomorphically eva...
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
public-key cryptography / fully homomorphic encryption threshold encryption secure multiparty computation
2012/3/22
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bob homomorphically eva...
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
public-key cryptography / fully homomorphic encryption threshold encryption secure multiparty computation
2012/3/21
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bob homomorphically eva...
Secure Computation on the Web: Computing without Simultaneous Interaction
cryptographic protocols / SFE Web-based computing
2012/3/29
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even if some of the partici...
Efficient group authentication protocols based on human interaction
Efficient group authentication protocols PKI
2009/6/12
A preliminary version of this paper appeared in the informal proceedingds
of the workshop on Foundation of Computer Security and Automated
Reasoning Protocol Security Analysis, pp. 9-31 (FCS-ARSPA 2...