搜索结果: 1-15 共查到“军事学 Service”相关记录24条 . 查询时间(0.14 秒)
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
ZK contingent payments Bitcoin zkSNARKs
2019/8/27
While fair exchange of goods is known to be impossible without assuming a trusted party, smart contracts in cryptocurrencies forgo such parties by assuming trust in the currency system. They allow a s...
We propose a mechanism for an m-party dishonest majority Multi-Party Computation (MPC) protocol to obtain the required pre-processing data (called Beaver Triples), from a subset of a set of cloud serv...
MixEth: efficient, trustless coin mixing service for Ethereum
Cryptography Verifiable shuffle Anonymity
2019/4/3
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains. MixEth doe...
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation enable a set of parties to compute a joint function of their inputs, while preserving \emph{privacy}, \emph{correctness} and more. In theory, secure computa...
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
data privacy homomorphic encryption secure classification
2017/12/19
Smart Cities draw a nice picture of a connected city where useful services and data are ubiquitous, energy is properly used and urban infrastructures are well orchestrated. Fulfilling this vision in o...
AnoNotify: A Private Notification Service
private notifications Bloom filters differential privacy
2016/5/17
AnoNotify is a service for private, timely and low-cost on-line notifications. We present the design and security arguments behind AnoNotify, as well as an evaluation of its cost. AnoNotify is based o...
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
cryptographic protocols bitcoin secure computation
2016/1/6
Bitcoin supports complex transactions where the recipient of a transaction
can be programmatically determined. Using these transactions, multiparty
computation protocols that aim to ensure fairness ...
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Publish-Subscribe BP-ABE Subscription Policy
2016/1/5
Data publish-subscribe service is an effective approach to share and filter data. Due to the huge volume and velocity of data generated daily, cloud systems are inevitably becoming the platform for da...
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Cloud service selection Brokerage system Merkle hash tree
2015/12/31
Cloud brokers have been recently introduced as an additional computational layer to facilitate cloud selection and service
management tasks for cloud consumers. However, existing brokerage schemes on...
The Pythia PRF Service
partially oblivious pseudorandom function verifiable pseudorandom function
2015/12/29
Conventional cryptographic services such as hardware-security modules and software-based key-management systems offer the ability to apply a pseudorandom function (PRF) such as HMAC to inputs of a cli...
Efficient Key Authentication Service for Secure End-to-end Communications
Certificate transparency End-to-end encryption Key authentication
2015/12/23
After four decades of public key cryptography, both the industry and academia seek better solutions
for the public key infrastructure. A recent proposal, the certificate transparency concept, tries t...
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
implementation applications
2015/12/22
Cloud providers are realizing the outsourced database model in the form of database-as-a-service offerings. However, security in terms of data privacy remains an obstacle because data storage and proc...
Factoring as a Service
RSA factoring cloud computing
2015/12/22
The difficulty of integer factorization is fundamental to modern
cryptographic security using RSA encryption and signatures. Although a
512-bit RSA modulus was first factored in 1999, 512-bit RSA re...
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
client puzzles time-lock puzzles enial of service resistance
2012/6/14
Client puzzles are moderately-hard cryptographic problems --- neither easy nor impossible to solve --- that can be used as a countermeasure against denial of service attacks on network protocols. Puzz...