搜索结果: 1-15 共查到“军事学 Matrix”相关记录47条 . 查询时间(0.171 秒)
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
MPC with preprocessing correlated randomness optimal round complexity
font style='font-size:12px;'>
2019/9/16
We present preprocessing-MPC schemes of arithmetic functions with optimal round complexity, function-independent correlated randomness, and communication and space complexities that grow linearly with...
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
IoV security analysis matrix encryption
font style='font-size:12px;'>
2019/7/23
Internet of Things (IoT) has various applications such as healthcare, supply chain, agriculture, etc. Using the Internet of Vehicles(IoV) to control traffic of the cities is one of the IoT application...
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Lattice based cryptography Discrete Gaussian sampling Matrix decomposition
font style='font-size:12px;'>
2019/4/1
Many advanced lattice based cryptosystems require to sample lattice points from Gaussian distributions. One challenge for this task is that all current algorithms resort to floating-point arithmetic (...
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Homomorphic encryption approximate arithmetics matrix operations
font style='font-size:12px;'>
2019/1/4
HEAAN is a homomorphic encryption (HE) scheme for approximate arithmetics. Its vector packing technique proved its potential in cryptographic applications requiring approximate computations, including...
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Pseudorandom functions LWE MDDH
font style='font-size:12px;'>
2018/11/19
We construct efficient and tightly secure pseudorandom functions (PRFs) with only logarithmic security loss and short secret keys. This yields very simple and efficient variants of well-known construc...
Secure Outsourced Matrix Computation and Application to Neural Networks
Homomorphic encryption matrix computation machine learning
font style='font-size:12px;'>
2018/11/2
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and security issues in outsourcing computation on sensitive data to an untrusted computation environment. Comparing...
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Binary matrix LWE Linear Programming Cryptanalysis
font style='font-size:12px;'>
2018/8/16
We consider Galbraith's space efficient LWE variant, where the (m×n)(m×n)-matrix AA is binary. In this binary case, solving a vectorial subset sum problem over the integers allows for decryption. We s...
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
secure linear algebra multiparty computation
font style='font-size:12px;'>
2018/8/2
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Secure matrix multiplications Leveled fully homomorphic encryption Packing methods
font style='font-size:12px;'>
2018/7/10
Secure matrix computation is one of the most fundamental and useful operations for statistical analysis and machine learning with protecting the confidentiality of input data. Secure computation can b...
Randomness analysis for multiple-recursive matrix generator
Linear feedback shift register stream cipher randomness
font style='font-size:12px;'>
2018/6/19
Randomness testing of binary sequences generated by any keystream generator is of paramount importance to both designer and attacker. Here we consider a word-oriented keystream generator known as mult...
Homomorphic Encryption for Approximate Matrix Arithmetic
Homomorphic encryption approximate arithmetic matrix multiplication
font style='font-size:12px;'>
2018/6/5
Homomorphic Encryption for Arithmetic of Approximate Numbers (HEAAN) with its vector packing technique proved its potential in cryptographic applications. In this paper, we propose MHEAAN - a generali...
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
multivariate public key cryptography differential invariant MinRank
font style='font-size:12px;'>
2017/3/6
In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes whi...
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Matrix Diffie-Hellman Problems Black-Box Reductions Decisional Linear Assumption
font style='font-size:12px;'>
2017/2/20
In this paper we provide new algebraic tools to study the relationship between different Matrix Diffie-Hellman (MDDH) Problems, which are recently introduced as a natural generalization of the so-call...
Construction of Lightweight MDS Matrices over Matrix Polynomial Residue Ring
MDS matrix XOR count matrix polynomial residue ring
font style='font-size:12px;'>
2016/12/29
In this article, we investigate the construction of lightweight MDS matrices. The key contribution of present paper is constructing MDS matrices over matrix polynomial residue ring. To the best of our...
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
Lattices zero-knowledge proofs group encryption anonymity
font style='font-size:12px;'>
2016/12/9
Group encryption (GE) is the natural encryption analogue of group signatures in that it allows verifiably encrypting messages for some anonymous member of a group while providing evidence that the rec...