搜索结果: 1-15 共查到“军队指挥学 Aggregation”相关记录28条 . 查询时间(0.421 秒)
DDH-based Multisignatures with Public Key Aggregation
Multisignatures Decisional Diffie-Hellman assumption Blockchain
2019/7/8
A multisignature scheme allows a group of signers to produce a joint signature on a common message, which is more compact than a collection of distinct signatures from all signers. Given this signatur...
MapReduce programming paradigm allows to process big data sets in parallel on a large cluster. We focus on a scenario where the data owner outsources her data on an honest-but-curious server. Our aim ...
Aggregate signature allows non-interactively condensing multiple individual signatures into a compact one. Besides the faster verification, it is useful to reduce storage and bandwidth, and is especia...
We focus on a scenario in which a single company wishes to obtain the distribution of aggregate features, while ensuring a high level of privacy for the users. We are interested in the case where user...
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Aggregator Oblivious Encryption Public Verifiability
2017/5/31
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since...
Practical Secure Aggregation for Privacy Preserving Machine Learning
Privacy Preserving Machine Learning cryptographic protocols
2017/3/31
We design a novel, communication-efficient, failure-robust protocol for secure aggregation of high-dimensional data. Our protocol allows a server to compute the sum of large, user-held data vectors fr...
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
data aggregation verifiable computation homomorphic encryption
2017/2/20
We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authentic...
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
data aggregation privacy time-series data
2016/1/23
With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that...
Resilient Aggregation in Simple Linear Sensor Networks
wireless sensor network resilient aggregation linear network
2016/1/23
A sensor network is a network comprised of many small, wireless, resourcelimited nodes that sense data about their environment and report readings to a base station. One technique to conserve power ...
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
privacy participatory sensing collusion resistance
2016/1/9
Participatory sensing enables new paradigms and markets for information collection based on the ubiquitous availability of smartphones, but also introduces privacy challenges for participating users a...
Differentially Private Data Aggregation with Optimal Utility
Secure Multiparty Computation (SMPC) Distributed Differential Privacy Data Aggregation
2016/1/9
Computing aggregate statistics about user data is of vital importance for a
variety of services and systems, but this practice has been shown to seriously undermine
the privacy of users. Differentia...
Over the past few years, online service providers have started gathering increasing amounts of personal
information to build user profiles and monetize them with advertisers and data brokers. Users h...
Existing work on data collection and analysis for aggregation is mainly
focused on confidentiality issues. That is, the untrusted Aggregator learns only
the aggregation result without divulging indi...
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
applications public-key cryptography
2015/12/24
We consider a sensor network setting in which the sensed samples are encrypted individually using different keys before being streamed to a cloud storage. For large systems with high capacity, e.g. ge...
Collusion Resistant Aggregation from Convertible Tags
obliviousness unforgeability collusion resistance
2015/12/21
The progress in communication and hardware technology increases
the computational capabilities of personal devices. Data is produced
massively from ubiquitous devices that cannot be stored locally.
...