搜索结果: 1-15 共查到“军事学 treatment”相关记录22条 . 查询时间(0.186 秒)
A Composable Security Treatment of the Lightning Network
blockchain scalability universal composition
2019/7/10
The high latency and low throughput of blockchain protocols constitute one of the fundamental barriers for their wider adoption.Overlay protocols, notably the lightning network, have been touted asthe...
In cryptocurrencies such as Bitcoin or Ethereum users control funds via secret keys. To transfer funds from one user to another, the owner of the money signs a new transaction that transfers the funds...
A Modular Treatment of Blind Signatures from Identification Schemes
Blind signature identification schemes Forking Lemma
2019/3/6
We propose a modular security treatment of blind signatures derived from linear identification schemes in the random oracle model. To this end, we present a general framework that captures several wel...
Bitcoin, being the most successful cryptocurrency, has been repeatedly attacked with many users losing their funds. The industry's response to securing the user's assets is to offer tamper-resistant h...
Achieving Fair Treatment in Algorithmic Classification
fairness classification black-box algorithms
2018/11/8
Fairness in classification has become an increasingly relevant and controversial issue as computers replace humans in many of today’s classification tasks. In particular, a subject of much recent deba...
Untagging Tor: A Formal Treatment of Onion Encryption
Anonymity Onion Routing Secure Channels
2018/3/7
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of o...
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
The security of almost any real-world distributed system today depends on the participants having some "reasonably accurate" sense of current real time. Indeed, to name one example, the very authentic...
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Fiat-Shamir Quantum Random Oracle Tightness
2017/9/25
The Fiat-Shamir transform is a technique for combining a hash function and an identification scheme to produce a digital signature scheme. The resulting scheme is known to be secure in the random orac...
A Formal Treatment of Multi-key Channels
secure channel multi-key channel Transport Layer Security (TLS 1.3)
2017/6/2
Secure channel protocols protect data transmission over a network from being overheard or tampered with. In the common abstraction, cryptographic models for channels involve a single key for ensuring ...
Bitcoin as a Transaction Ledger: A Composable Treatment
Transaction Ledger Composable Treatment
2017/2/23
In this work we put forth a universally composable treatment of the Bitcoin protocol. We specify the goal that Bitcoin aims to achieve as a ledger shared-functionality, aka global setup, in the (G)UC ...
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
Application Programming Interfaces Hardware Security Modules
2016/6/7
Application Programming Interfaces (APIs) to cryptographic tokens
like smartcards and Hardware Security Modules (HSMs) provide users with commands
to manage and use cryptographic keys stored on trus...
A Formal Treatment of Backdoored Pseudorandom Generators
pseudorandomness subversion pseudorandom generator
2016/3/21
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses a PRG instance for which she knows a trapdoor that allows prediction of future (and possibly past) g...
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Guess and Determine attack Stream cipher MICKEY
2016/1/23
By combining the time-memory-data tradeoff (TMDTO) attack independently proposed by Babbage and Goli碿 (BG) with the BSW sampling technique, this paper explores to mount a new TMDTO attack on stream...
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy attribute-based credentials anonymous credentials
2016/1/7
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to
privacy-friendly authentication systems, allowing users to obtain credentials on attributes and
prove possession of t...