搜索结果: 1-15 共查到“Threshold”相关记录318条 . 查询时间(0.104 秒)
Major Atlantic ocean current system might be approaching critical threshold
weather systems worldwide river stability current system collapses global warming freshwater inflow
2021/8/6
A major Atlantic ocean current -- the Atlantic Meridional Overturning Circulation, or AMOC -- may have been losing stability in the course of the last century, according to new research. A potential c...
Sharing the LUOV: Threshold Post-Quantum Signatures
cryptographic protocols linear secret shared schemes
2019/9/19
We examine all of the signature submissions to Round-2 of the NIST PQC ``competition'' in the context of whether one can transform them into threshold signature schemes in a relatively straight forwar...
Threshold Implementations (TI) are secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requir...
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
secret sharing ideal secret sharing 2-threshold secret sharing
2019/5/31
In a secret sharing scheme, a secret value is encrypted into several shares, which are distributed among corresponding participants. It requires that only predefined subsets of participants can recons...
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
threshold cryptography elliptic curve cryptography multi-party computation
2019/5/21
Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among ...
The Communication Complexity of Threshold Private Set Intersection
Communication Complexity Private Set Intersection
2019/3/1
Threshold private set intersection enables Alice and Bob who hold sets AA and BB of size nn to compute the intersection A∩BA∩B if the sets do not differ by more than some threshold parameter tt. In th...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
A threshold signature scheme enables distributed signing among nn players such that any subgroup of size t+1t+1 can sign, whereas any group with tt or fewer players cannot. While there exist previous ...
RADIATIVE TRANSFER MODEL SIMULATIONS TO DETERMINE THE NIGHT TIME FOG DETECTION THRESHOLD
Fog detection, Radiative Transfer Model SBDART Indo-Gangetic plain Brightness temperature difference threshold Middle Infrared Thermal Infrared
2019/2/28
Every winter the Indo-Gangetic plains (IGP) of northern India are severely impacted both socially and economically by fog. For night time fog detection, visible imagery cannot be used. Also, as emissi...
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
side-channel analysis threshold implementation uniformity
2018/11/13
Threshold Implementations are well-known as a provably firstorder secure Boolean masking scheme even in the presence of glitches. A precondition for their security proof is a uniform input distributio...
PASTA: PASsword-based Threshold Authentication
passwords token-based authentication threshold cryptography
2018/11/13
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authent...
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Threshold Implementations PRINCE SCA
2018/11/8
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input s...
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
MPC threshold encryption obfuscation
2018/11/5
We explore large-scale fault-tolerant multiparty computation on a minimal communication graph. Our goal is to be able to privately aggregate data from thousands of users - for example, in order to obt...
Threshold Partially-Oblivious PRFs with Applications to Key Management
Oblivious PRF Key Management
2018/8/10
An Oblivious PRF (OPRF) is a protocol between a server holding a key to a PRF and a user holding an input. At the end of the interaction, the user learns the output of the OPRF on its input and nothin...