搜索结果: 1-15 共查到“知识库 Sound”相关记录173条 . 查询时间(0.232 秒)
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Structure-preserving signatures QA-NIZK simulation-soundness
font style='font-size:12px;'>
2019/9/16
We show how to construct structure-preserving signatures (SPS) and unbounded quasi-adaptive non-interactive zero-knowledge (USS QA-NIZK) proofs with a tight security reduction to simple assumptions, b...
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security
LWE standard model Naor-Yung
font style='font-size:12px;'>
2019/8/8
The Naor-Yung paradigm is a well-known technique that constructs IND-CCA2-secure encryption schemes by means of non-interactive zero-knowledge proofs satisfying a notion of simulation-soundness. Until...
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland
TFNP round-collapse average-case hardness
font style='font-size:12px;'>
2019/6/26
This result follows from a more general theory of interactive average-case complexity, and in particular, a novel round-collapse theorem for computationally-sound protocols, analogous to Babai-Moran's...
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
zero-knowledge NIZK RSA ZAP
font style='font-size:12px;'>
2019/6/26
In this paper we put forth new one-message proof systems for several practical applications, like proving that an El Gamal ciphertext (over a multiplicative group) decrypts to a given value and correc...
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
AKE provable security tightness
font style='font-size:12px;'>
2019/6/24
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols which are extremely simple and efficient. Unli...
Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs
NIZK QAP QSP
font style='font-size:12px;'>
2019/6/4
Motivated by applications like verifiable computation and privacy-preserving cryptocurrencies, many efficient pairing-based SNARKs were recently proposed. However, the most efficient SNARKs like the o...
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
non-uniform certificates concurrent zero-knowledge
font style='font-size:12px;'>
2019/6/4
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
QA-NIZK simulation-soundness tight security
font style='font-size:12px;'>
2018/11/15
We construct the first (almost) tightly-secure unbounded-simulation-sound quasi-adaptive non-interactive zero-knowledge arguments (USS-QA-NIZK) for linear-subspace languages with compact (number of gr...
Resettably-Sound Resettable Zero Knowledge in Constant Rounds
zero knowledge resettable ZK resettable soundness
font style='font-size:12px;'>
2017/9/25
In FOCS 2001 Barak et al. conjectured the existence of zero-knowledge arguments that remain secure against resetting provers and resetting verifiers. The conjecture was proven true by Deng et al. in F...
Succinct Spooky Free Compilers Are Not Black Box Sound
Delegation Spooky free encryption
font style='font-size:12px;'>
2017/9/18
It is tempting to think that if we encrypt a sequence of messages {xi} using a semantically secure encryption scheme, such that each xi is encrypted with its own independently generated public key pki...
Talking sense: The behavioural and neural correlates of sound symbolism
neural correlates sound symbolism
font style='font-size:12px;'>
2017/9/1
Many PhDs start with a quote from a scientist/author/bearded man from centuries ago.
This well-chosen quote demonstrates both the timeless nature of the important topic
in question and precisely how...
Introduction to the Special Issue on the Emergence of Sound Systems
sound systems speech phonetics
font style='font-size:12px;'>
2017/9/1
How did human sound systems get to be the way they are? Collecting contributions implementing a wealth of methods to address this question, this special issue treats language and speech as being the r...
Cognitive load makes speech sound fast, but does not modulate acoustic context effects
Cognitive load Acoustic context Rate normalization
font style='font-size:12px;'>
2017/8/25
In natural situations, speech perception often takes place during the concurrent execution of other cognitive tasks, such as listening while viewing a visual scene. The execution of a dual task typica...
Optimally Sound Sigma Protocols Under DCRA
Culpable soundness designated verifier homomorphic encryption
font style='font-size:12px;'>
2017/7/24
Given a well-chosen additively homomorphic cryptosystem and a ΣΣ protocol with a linear answer, Damgård, Fazio, and Nicolosi proposed a non-interactive designated-verifier zero knowledge argument...
Towards Sound and Optimal Leakage Detection Procedure
Side channel analysis leakage detection higher criticism
font style='font-size:12px;'>
2017/4/5
Evaluation of side channel leakage for the embedded crypto systems requires sound leakage detection procedures. We relate the test vector leakage assessment (TVLA) procedure to the statistical minimum...