搜索结果: 1-15 共查到“军队指挥学 Ring”相关记录168条 . 查询时间(0.146 秒)
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function from the family, an input output pair that satisfies the relation. Correl...
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
Module-LWE versus Ring-LWE, Revisited
Lattice-based Cryptography Security Reduction Cyclotomic Fields
2019/8/19
Till now, the only reduction from the module learning with errors problem (MLWE) to the ring learning with errors problem (RLWE) is given by Albrecht et al.et al. in ASIACRYPT 20172017. Reductions fro...
Many cryptographic schemes have been proposed from learning with errors problems over some rings (Ring-LWE). Polynomial time quantum reduction from the approximating Shortest Independent Vectors Probl...
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Homomorphic Encryption Oblivious RAM
2019/6/24
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to hide access pattern to its data encrypted and stored at a remote server. Traditionally, ORAM algorithms assume the server acts...
We describe an efficient linkable ring signature scheme, compact linkable spontaneous anonymous group (CLSAG) signatures, for use in confidential transactions. Compared to the existing signature schem...
Cryptanalysis of Ring Homomorphic Encryption Schemes
homomorphic encryption schemes quantum computing key-recovery attack
2019/6/3
We analyze the structure of finite commutative rings with respect to its idempotent and nilpotent elements. Based on this analysis we provide a quantum-classical IND-CCA^1 attack for ring homomorphic ...
Discretisation and Product Distributions in Ring-LWE
Ring-LWE Discretisation Homomorphic Encryption
2019/6/3
A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for d...
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Ring Confidential Transactions Log-size Proofs
2019/5/31
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
(Linkable) Ring Signature from Hash-Then-One-Way Signature
ring signature linkable ring signature lattice-based cryptography
2019/5/28
In this paper, we revisit the generic construction of ring signatures from hash-then-one-way type (Type−HType−H) signatures proposed by Abe et al. (AOS) in 2004 and made the following cont...
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Elliptic curves formal groups degenerate curves
2019/5/21
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attack...
A Central Limit Framework for Ring-LWE Decryption
Ring-LWE Central Limit Theorem δ-subgaussian
2019/5/9
The purpose of this paper is to use a Central Limit approach to develop a statistical framework for analysing ciphertexts in Ring-LWE homomorphic encryption schemes. This statistical framework gives r...
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Group key exchange Ring learning with errors Post-quantum cryptography
2019/4/22
Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network. A number of solutions to this problem have been proposed over the years, ...
Generic Construction of Linkable Ring Signature
ring signature linkable ring signature generic construction
2019/4/11
We propose a generic construction of linkable ring signature from any compatible ring signature scheme and one-time signature scheme. Our construction has both theoretical and practical interest. In t...
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...