搜索结果: 1-7 共查到“军事学 multiparty protocols”相关记录7条 . 查询时间(0.1 秒)
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
secret sharing AES fault attacks
2017/3/27
Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. Recently, secure multiparty computation has been applied to prevent side channel at...
Securing Multiparty Protocols against the Exposure of Data to Honest Parties
secure multiparty computation universal composability
2016/6/27
We consider a new adversarial goal in multiparty protocols, where the adversary
may corrupt some parties. The goal is to manipulate the view of some honest party
in a way, that this honest party lea...
Verifiable Computation in Multiparty Protocols with Honest Majority
Secure multiparty computation verifiable computation linear PCP
2016/1/26
We present a generic method for turning passively secure
protocols into protocols secure against covert attacks. The method adds
a post-execution verification phase to the protocol that allows a mis...
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
deniability anonymity anonymous authentication
2016/1/7
In the problem of anonymous authentication (Boneh et al. CCS 1999), a sender wishes
to authenticate a message to a given recipient in a way that preserves anonymity: the recipient does
not know the ...
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
secure multiparty computation verification
2015/12/29
This paper presents a generic method for turning passively
secure protocols into protocols secure against covert attacks, adding an
offline preprocessing and a cheap post-execution verification phas...
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Multiparty computation MPC
2014/3/11
We put forward a new approach for the design of efficient multiparty protocols:
1. Design a protocol for a small number of parties (say, 3 or 4) which achieves security against a single corrupted par...
On adaptive vs. non-adaptive security of multiparty protocols
non-adaptive security multiparty protocols
2009/4/16
On adaptive vs. non-adaptive security of multiparty protocols.