搜索结果: 1-6 共查到“军队指挥学 efficient protocols”相关记录6条 . 查询时间(0.078 秒)
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Building Modular Efficient Protocols
2019/1/26
We want to design and analyze protocols in a modular way by combining idealized components that we realize individually. While this is in principle possible using security frameworks that provide gene...
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Lattice-Based Cryptography Zero-Knowledge Arguments of Knowledge Privacy-Preserving Protocol
2017/8/17
In an accountable anonymous system, a user is guaranteed anonymity and unlinkability unless some well-defined condition is met. A line of research focus on schemes that do not rely on any trusted thir...
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Lattice-based cryptography anonymity signatures with efficient protocols
2016/2/23
A recent line of works – initiated by Gordon, Katz and Vaikuntanathan
(Asiacrypt 2010) – gave lattice-based constructions allowing
users to authenticate while remaining hidden in a crowd. Despite fi...
Secure and Efficient Protocols for Iris and Fingerprint Identification
secure biometric computation two-party protocols implementation
2010/12/14
With recent advances in biometric recognition and the increasing use of biometric data in various applications, it is apparent that sensitive biometric data needs to be adequately protected. Biometric...
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Efficient Protocols Set Intersection Pattern Matching Malicious and Covert Adversaries
2009/6/11
In this paper we construct efficient secure protocols for set intersection and pattern match-
ing. Our protocols for securely computing the set intersection functionality are based on secure
pseudor...
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Security Covert Adversaries Efficient Protocols Realistic Adversaries
2008/9/12
In the setting of secure multiparty computation, a set of mutually distrustful parties wish
to securely compute some joint function of their private inputs. The computation should be
carried out in ...