搜索结果: 1-9 共查到“军事学 Validation”相关记录9条 . 查询时间(0.218 秒)
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Bloom filters set operations set relations
font style='font-size:12px;'>
2019/9/5
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relati...
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
font style='font-size:12px;'>
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
Privacy-Preserving Network Path Validation
Network path validation Path privacy Index privacy
font style='font-size:12px;'>
2019/4/23
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path in order t...
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Primality testing Miller-Rabin test Diffie-Hellman
font style='font-size:12px;'>
2019/1/18
We consider the problem of constructing Diffie-Hellman (DH) parameters which pass standard approaches to parameter validation but for which the Discrete Logarithm Problem (DLP) is relatively easy to s...
Edrax: A Cryptocurrency with Stateless Transaction Validation
cryptocurrency blockchain stateless transaction validation
font style='font-size:12px;'>
2018/11/6
We present Edrax, a general architecture for building cryptocurrencies with stateless transaction validation. In Edrax, all cryptocurrency nodes, such as miners and validating nodes, can validate inco...
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
secret sharing threshold cryptography zero knowledge
font style='font-size:12px;'>
2015/12/31
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, ev...
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption
Symmetric Dual PRFs
font style='font-size:12px;'>
2015/12/18
The security of HMAC is proven under the assumption that its compression function is a
dual PRF, meaning a PRF when keyed by either of its two inputs. But, not only do we not
know whether particular...
Secure multi-party data analysis: end user validation and practical experiments
secure multi-party computation end-user validation privacy preserving statistical analysis
font style='font-size:12px;'>
2014/3/5
Research papers on new secure multi-party computation protocols rarely confirm the need for the developed protocol with its end users. One challenge in the way of such validation is that it is hard to...
Key recovery attacks on NTRU without ciphertext validation routine
Key recovery attacks NTRU ciphertext validation routine
font style='font-size:12px;'>
2009/4/15
NTRU is an efficient public-key cryptosystem proposed by
Hoffstein, Pipher, and Silverman. Assuming access to a decryption oracle,
we show ways to recover the private key of NTRU systems that do not...