搜索结果: 1-15 共查到“军事学 Distributed”相关记录92条 . 查询时间(0.062 秒)
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
threshold cryptography distributed cryptography asynchronous consensus
2019/9/16
In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)...
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
MPC with preprocessing correlated randomness optimal round complexity
2019/9/16
We present preprocessing-MPC schemes of arithmetic functions with optimal round complexity, function-independent correlated randomness, and communication and space complexities that grow linearly with...
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Distributed Key Generation DKG Ethereum
2019/8/30
Distributed key generation (DKG) is a fundamental building block for a variety of cryptographic schemes and protocols, such as threshold cryptography, multi-party coin tossing schemes, public randomne...
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
puncturable encryption forward secrecy distributed setting
2019/8/14
Managing sensitive data in highly-distributed environments is gaining a lot of attention recently. Often, once data is presented to such environments, this data is persistent there. Being able to "for...
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Blockchain bitcoin distributed ledger technology
2019/7/17
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
Robust and Scalable Consensus for Sharded Distributed Ledgers
Blockchain sharding randomness
2019/6/12
ByzCoin, a promising alternative of Bitcoin, is a scalable consensus protocol used as a building block of many research and enterprise-level decentralized systems. In this paper, we show that ByzCoin ...
CellTree: A New Paradigm for Distributed Data Repositories
blockchain distributed data repositories CellTree
2019/5/21
We present CellTree, a new architecture for distributed data repositories. The repository allows data to be stored in largely independent, and highly programmable cells, which are “assimilated” into a...
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
applied secure multiparty computation distributed exponentiation applied cryptography
2019/4/3
Bit-decomposition is a powerful tool which can be used to design constant round protocols for bit-oriented multiparty computation (MPC) problems, such as comparison and Hamming weight computation. How...
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
secure computation machine learning
2019/3/13
Exploiting data sparsity is crucial for the scalability of many data analysis tasks. However, while there is an increasing interest in efficient secure computation protocols for distributed machine le...
We consider the problem of designing scalable, robust protocols for computing statistics about sensitive data. Specifically, we look at how best to design differentially private protocols in a distrib...
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs
linear PCPs proof systems zero knowledge
2019/3/1
We introduce and study the notion of fully linear probabilistically checkable proof systems. In such a proof system, the verifier can make a small number of linear queries that apply jointly to the in...
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
digital signatures distributed cryptography implementation
2019/2/27
Migration of security applications to the cloud poses unique challenges in key management and protection: asymmetric keys which would previously have resided in tamper-resistant, on-premise Hardware S...
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
privacy-preserving machine learning information-theoretic privacy
2019/2/26
How to train a machine learning model while keeping the data private and secure? We present CodedPrivateML, a fast and scalable approach to this critical problem. CodedPrivateML keeps both the data an...
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Oblivious RAM Multi-Server Setting Secure Computation
2019/1/26
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM,...