搜索结果: 1-15 共查到“军事学 Parallel I/O”相关记录77条 . 查询时间(0.156 秒)
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments
parallel repetition interactive argument smooth KL-divergence
font style='font-size:12px;'>
2019/4/22
Soundness amplification is a central problem in the study of interactive protocols. While ``natural'' parallel repetition transformation is known to reduce the soundness error of some special cases of...
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Homomorphic encryption Genome-wide association studies Logistic regression
font style='font-size:12px;'>
2019/3/21
The sharing of biomedical data is crucial to enable scientific discoveries across institutions and improve health care. For example, genome-wide association studies (GWAS) based on a large number of s...
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
fully homomorphic encryption logistic regression genome privacy
font style='font-size:12px;'>
2019/2/27
Background Privacy-preserving computations on genomic data, and more generally on medical data, is a critical path technology for innovative, life-saving research to positively and equally impact the ...
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
FV homomorphic encryption latticebased cryptography polynomial multiplication
font style='font-size:12px;'>
2019/2/25
Homomorphic encryption is a tool that enables computation on encrypted data and thus has applications in privacy-preserving cloud computing. Though conceptually amazing, implementation of homomorphic ...
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Bitcoin blockchain parallel composition
font style='font-size:12px;'>
2018/11/21
Two of the most significant challenges in the design of blockchain protocols is increasing their transaction processing throughput and minimising latency in terms of transaction settlement. In this wo...
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Side-channel attacks masking countermeasure refreshing algorithms
font style='font-size:12px;'>
2018/5/28
Refreshing algorithms are a critical ingredient for secure masking. They are instrumental in enabling sound composability properties for complex circuits, and their randomness requirements dominate th...
Perfectly Secure Oblivious Parallel RAM
Oblivious RAM Oblivious Parallel RAM
font style='font-size:12px;'>
2018/4/19
We show that PRAMs can be obliviously simulated with perfect security, incurring only O(logNloglogN) blowup in parallel runtime, O(log3N) blowup in total work, and O(1) blowup in space relative to the...
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
implementation homomorphic encryption
font style='font-size:12px;'>
2018/3/5
A number of homomorphic encryption application areas, such as privacy-preserving machine learning analysis in the cloud, could be better enabled if there existed a general solution for combining suffi...
(A Counterexample to) Parallel Repetition for Non-Signaling Multi-Player Games
parallel repetition non-signaling strategies
font style='font-size:12px;'>
2017/11/28
We give a three-player game whose non-signaling value is constant (2/3) under any number of parallel repetitions. This is the first known setting where parallel repetition completely fails to reduce t...
On the Depth of Oblivious Parallel RAM
OPRAM PRAM
font style='font-size:12px;'>
2017/9/13
Oblivious Parallel RAM (OPRAM), first proposed by Boyle, Chung, and Pass, is the natural parallel extension of Oblivious RAM (ORAM). OPRAM provides a powerful cryptographic building block for hiding t...
Low-communication parallel quantum multi-target preimage search
quantum cryptanalysis multi-target preimages parallel rho method
font style='font-size:12px;'>
2017/8/22
The most important pre-quantum threat to AES-128 is the 1994 van Oorschot--Wiener "parallel rho method", a low-communication parallel pre-quantum multi-target preimage-search algorithm. This algorithm...
Parallel Collision Search with Radix Trees
radix tree discrete logarithm parallelism
font style='font-size:12px;'>
2017/6/22
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks. Implementations available in the litera...
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
secure multi-party computation parallel composition broadcast
font style='font-size:12px;'>
2017/4/27
An important benchmark for multi-party computation protocols (MPC) is their round complexity. For several important MPC tasks, (tight) lower bounds on the round complexity are known. However, for some...
Farfalle: parallel permutation-based cryptography
pseudorandom function permutation-based crypto Keccak
font style='font-size:12px;'>
2017/1/3
In this paper, we introduce Farfalle, a new mode for building a pseudorandom function (PRF) from a b-bit cryptographic permutation. The constructed PRF takes as input a b-bit key and a sequence of var...
An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup
Oblivious RAM Oblivious Parallel RAM
font style='font-size:12px;'>
2016/12/15
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to access memory locations from a server without revealing its access patterns. Oblivious Parallel RAM (OPRAM) is a PRAM counterp...