搜索结果: 1-15 共查到“军队指挥学 efficiency”相关记录63条 . 查询时间(0.166 秒)
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
searchable encryption lower bound
2019/6/13
Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, ...
Improved prover efficiency and SRS size in a Sonic-like system
zk-SNARKs updatable SRS universal SRS
2019/6/3
Using ideas from the recent Aurora zk-STARK of Ben-Sasson et al. [BCRSVW, Eurocrypt 2019], we present a zk-SNARK with a universal and updatable SRS similar to the recent construction of Maller et al. ...
On the Efficiency of Privacy-Preserving Smart Contract Systems
privacy-preserving smart contracts zk-SNARKs UC-security
2019/5/14
Along with blockchain technology, smart contracts have found intense interest in lots of practical applications. A smart contract is a mechanism involving digital assets and some parties, where the pa...
Modeling Power Efficiency of S-boxes Using Machine Learning
Power Efficiency Optimal S-box Dynamic power
2019/2/26
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
We investigate the minimal number of group elements and prover running time in a zk-SNARK when using only a symmetric ``linear'' knowledge assumption, like the dd-Power Knowledge of Exponent assumptio...
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Vehicular communications (V2X) implicit certificates butterfly key expansion
2019/2/25
In the implicit certification model, the process of verifying the validity of the signer's public key is combined with the verification of the signature itself. When compared to traditional, explicit ...
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Direct anonymous attestation TPM 2.0 implementation Anonymous signatures
2018/11/29
Direct Anonymous Attestation (DAA) is an anonymous signature scheme, which is designed to allow the Trusted Platform Module (TPM), a small chip embedded in a host computer, to attest to the state of t...
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Blockchain Coded Sharding Efficiency Scaling
2018/11/8
Today’s blockchains do not scale in a meaningful sense. As more nodes join the system, the efficiency of the system (computation, communication, and storage) degrades, or at best stays constant. A lea...
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Functional encryption Adaptive security Succinctness
2018/11/6
Functional encryption (FE) is advanced encryption that enables us to issue functional decryption keys where functions are hardwired. When we decrypt a ciphertext of a message mm by a functional decryp...
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
searchable encryption symmetric primitives forward privacy
2018/5/28
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions ...
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
statistical zero-knowledge honest-verifier statistical zero-knowledge instance-dependent commitment schemes
2018/3/6
We present an unconditional transformation from any honest-verifier statistical zero-knowledge (HVSZK) protocol to standard SZK that preserves round complexity and efficiency of both the verifier and ...
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Random oracle model bounded retrieval model big-key cryptography
2018/3/5
Towards advancing the use of BIG keys as a practical defense against key exfiltration, this paper provides efficiency improvements for cryptographic schemes in the bounded retrieval model (BRM). We id...
Correction on “Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity”
masking scheme side-channel attacks probing model
2017/12/27
Provably secure masking schemes always require too many random generations, which significantly increases the implementation cost. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (...
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
data privacy homomorphic encryption secure classification
2017/12/19
Smart Cities draw a nice picture of a connected city where useful services and data are ubiquitous, energy is properly used and urban infrastructures are well orchestrated. Fulfilling this vision in o...
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
higher-order masking probing security
2017/11/1
Zhang, Qiu and Zhou propose two optimised masked algorithms for computing functions of the form x↦x⋅ℓ(x)x↦x⋅ℓ(x) for any linear function ℓℓ. They claim ...