搜索结果: 1-15 共查到“军事学 Outsourcing”相关记录37条 . 查询时间(0.015 秒)
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
modular exponentiations secure outsourcing
2018/11/2
We investigate the problem of securely outsourcing modular exponentiations to a single, malicious computational resource. We revisit recently proposed schemes using single server and analyse them agai...
State channels are a leading approach for improving the scalability of blockchains and cryptocurrencies. They allow a group of distrustful parties to optimistically execute an application-defined prog...
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Internet voting Modular exponentiations JavaScript cryptography
2018/4/3
Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known pro...
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
cryptographic protocols Outsourcing MPC-Preprocessing
2017/3/27
Most modern actively secure multiparty computation protocols make use of a function and input independent pre-processing phase. This pre-processing phase is tasked with producing some form of correlat...
Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation; outsourcing makes sense when these costs are cheaper than not outsourcing. Yet, prover costs are generally ...
Efficient and Secure Outsourcing of Genomic Data Storage
secure outsourcing homomorphic encryption private information retrieval
2017/3/9
loud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing of sensitive data, such as genomic data, c...
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
two-factor authentication unlinkability
2017/2/23
This work introduces PassPhone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...
Game-Theoretic Framework for Integrity Verication in Computation Outsourcing
computation outsourcing integrity game theory
2016/6/22
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the inte...
Secure Outsourcing of Circuit Manufacturing
hardware Trojans circuit compilers fabless manufacturing
2016/5/30
The fabrication process of integrated circuits (ICs) is complex and requires the use of
off-shore foundries to lower the costs and to have access to leading-edge manufacturing
facilities. Such an ou...
A Note on “Outsourcing Large Matrix Inversion Computation to a Public Cloud”
Cloud computing outsourcing computation
2016/5/9
We remark that the Lei et al.'s scheme [IEEE Transactions on Cloud Computing, 1 (1), 78-87, 2013] fails, because the verifying equation does not hold over the infinite field R. For the field R, the co...
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Secure outsource computation Cryptanalysis Coppersmith methods
2016/3/21
We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of an efficient protocol for securely outsourcing mult...
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Stealthy Privacy Attacks Multi-User Data Outsourcing Services
2016/2/24
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a user accesses the ou...
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
secure outsourcing algorithm bilinear pairings one-malicious model
2016/2/24
Outsourcing paradigm has become a hot research topic in the cryptography
community, where computation workloads can be outsourced to cloud servers by the
resource-constrained devices, such as RFID t...
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Collaborative filtering Outsourcing Integrity
2016/2/24
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers...