搜索结果: 1-15 共查到“军事学 channels”相关记录51条 . 查询时间(0.255 秒)
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Linkable Ring Signature Payment Channel Blockchain
2019/6/3
Monero has emerged as one of the leading cryptocurrencies with privacy by design. However, this comes at the price of reduced expressiveness and interoperability as well as severe scalability issues. ...
Subliminal channels in post-quantum digital signature schemes
Subliminal channels post-quantum digital signatures
2019/5/29
We analyze the digital signatures schemes submitted to NIST's Post-Quantum Cryptography Standardization Project in search for subliminal channels.
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurren...
On the Commitment Capacity of Unfair Noisy Channels
Commitment capacity unconditionally secure cryptography unfair noisy channels
2019/5/28
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivi...
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
blockchain distributed cryptography public-key cryptography
2019/4/10
Blockchain technology has immense potential. At the same time, it is not always possible to scale blockchains. State Channels solve the problem of scalability while increasing the blockchain's speed a...
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Secure Channels Ciphertext Fragmentation Universal Composability
2018/11/16
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful and versatile construct for formulating security in various areas of cryptography. However security de...
Partially specified channels: The TLS 1.3 record layer without elision
cryptographic standards TLS 1.3 stream-based channels
2018/7/2
This work advances the study of secure stream-based channels (Fischlin et al., CRYPTO ’15) by considering the multiplexing of many data streams over a single channel. This is an essential feature of r...
State channels are a leading approach for improving the scalability of blockchains and cryptocurrencies. They allow a group of distrustful parties to optimistically execute an application-defined prog...
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Side-channel Analysis Artificial Neural Networks Power
2018/5/28
Machine learning has become mainstream across industries. In this work we pose the following question: Is it possible to reverse engineer a neural network by using only side-channel information? We an...
Secure Two-Party Computation over Unreliable Channels
Secure multiparty computation Unreliable Channels Error-Correction
2018/5/28
We consider information-theoretic secure two-party computation in the plain model where no reliable channels are assumed, and all communication is performed over the binary symmetric channel (BSC) tha...
The common approach to defining secure channels in the literature is to consider transportation of discrete messages provided via atomic encryption and decryption interfaces. This, however, ignores th...
Leakage Bounds for Gaussian Side Channels
leakage-resilient cryptography leakage model mutual information
2017/10/12
In recent years, many leakage-resilient schemes have been published. These schemes guarantee security against side-channel attacks given bounded leakage of the underlying primitive. However, it is a c...
Secure Channels and Termination: The Last Word on TLS
Secure channels stateful length-hiding authenticated encryption (stLHAE) authenticated encryption with associated data (AEAD)
2017/8/21
Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channe...