搜索结果: 1-15 共查到“军事学 Scale-Out”相关记录25条 . 查询时间(0.187 秒)
We present modifications to the MPC system SCALE-MAMBA to enable the evaluation of garbled circuit (GC) based MPC functionalities and Linear Secret Sharing (LSSS) based MPC functionalities along side ...
Mobile Private Contact Discovery at Scale
Private Contact Discovery Private Set Intersection Oblivious Pseudorandom Function
2019/5/21
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire address book to the service provider. This allows the service provider to determine which of the user's contact...
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Blockchain Sharding Atomicity Parallel Security
2019/3/6
Cryptocurrencies have provided a promising infrastructure for pseudonymous online payments. However, low throughput has significantly hindered the scalability and usability of cryptocurrency systems f...
LucidiTEE: Policy-based Fair Computing at Scale
privacy policy fair exchange trusted execution environment
2019/3/1
In light of widespread misuse of personal data, we enable users to control the sharing and use of their data, even when offline, by binding that data to policies. A policy specifies the allowed functi...
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
MPC large scale concrete efficiency
2018/11/16
In this work we develop a new theory for concretely efficient, large-scale MPC with active security. Current practical techniques are mostly in the strong setting of all-but-one corruptions, which lea...
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation enable a set of parties to compute a joint function of their inputs, while preserving \emph{privacy}, \emph{correctness} and more. In theory, secure computa...
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
honest majority arithmetic circuits information-theoretic security
2018/6/6
Protocols for secure multiparty computation enable a set of parties to compute a function of their inputs without revealing anything but the output. The security properties of the protocol must be pre...
In this position paper, we initiate a systematic treatment of reaching consensus in a permissionless network. We prove several simple but hopefully insightful lower bounds that demonstrate exactly why...
OmniLedger: A Secure, Scale-Out, Decentralized Ledger
Blockchains Scale-Out Decentralization
2017/5/12
Designing a secure and open Distributed Ledger (DL) system that performs on par with classic payment-service providers such as Visa is a challenging task. Current proposals either do not scale-out or ...
Privacy-Preserving Interdomain Routing at Internet Scale
BGP secure multi-party computation
2017/5/11
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today's Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security ...
When a group of individuals and organizations wish to compute a stable matching---for example, when medical students are matched to medical residency programs---they often outsource the computation to...
Scale-Invariant Fully Homomorphic Encryption over the Integers
Fully Homomorphic Encryption Approximate-GCD Homomorphic AES
2016/1/26
At Crypto 2012, Brakerski constructed a scale-invariant fully homomorphic encryption
scheme based on the LWE problem, in which the same modulus is used throughout the evaluation
process, instead of ...
We are interested in secure computation protocols in settings where the number of parties
is huge and their data even larger. Assuming the existence of a single-use broadcast channel
(per player), w...
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
key recovery attack private key
2016/1/6
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al~\cite{NTRUbasedFHE} in 2013. The attack allows us to compu...
ANONIZE: A Large-Scale Anonymous Survey System
cryptographic protocols anonymous survey, accountability
2015/12/29
A secure ad-hoc survey scheme enables a survey authority to independently (without
any interaction) select an ad-hoc group of registered users based only on their
identities (e.g., their email addre...