搜索结果: 1-10 共查到“军事学 large scale”相关记录10条 . 查询时间(0.194 秒)
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
MPC large scale concrete efficiency
2018/11/16
In this work we develop a new theory for concretely efficient, large-scale MPC with active security. Current practical techniques are mostly in the strong setting of all-but-one corruptions, which lea...
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation enable a set of parties to compute a joint function of their inputs, while preserving \emph{privacy}, \emph{correctness} and more. In theory, secure computa...
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
honest majority arithmetic circuits information-theoretic security
2018/6/6
Protocols for secure multiparty computation enable a set of parties to compute a function of their inputs without revealing anything but the output. The security properties of the protocol must be pre...
In this position paper, we initiate a systematic treatment of reaching consensus in a permissionless network. We prove several simple but hopefully insightful lower bounds that demonstrate exactly why...
We are interested in secure computation protocols in settings where the number of parties
is huge and their data even larger. Assuming the existence of a single-use broadcast channel
(per player), w...
ANONIZE: A Large-Scale Anonymous Survey System
cryptographic protocols anonymous survey, accountability
2015/12/29
A secure ad-hoc survey scheme enables a survey authority to independently (without
any interaction) select an ad-hoc group of registered users based only on their
identities (e.g., their email addre...
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
Searchable Symmetric Encryption Secure Databases Private Cloud Computing
2015/12/18
With the growing popularity of remote storage, the ability to outsource a large private
database yet be able to search on this encrypted data is critical. Searchable symmetric encryption
(SSE) is a ...
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
radio frequency identification RFID identification protocol privacy untraceability location privacy scalability
2012/3/29
In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we ...
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Electronic Voting DRE internet voting
2010/8/26
The Direct Recording Electronic (DRE) system commonly uses touch-screen technology to directly record votes. It can provide several benefits in large-scale electronic voting, including usability, acce...
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Efficient Key Distribution Schemes Large Scale Mobile Computing Applications Mobile Computing
2009/6/5
In emerging networks consisting of large-scale deployments of mobile devices, efficient security mechanisms
are required to facilitate cryptographic authentication. While computation and bandwidth ov...