搜索结果: 1-15 共查到“军事学 Tree”相关记录31条 . 查询时间(0.046 秒)
Tree authenticated ephemeral keys
public-key cryptography digital signatures key management
2019/8/14
Public key algorithms based on QC-MPDC and QC-LDPC codes for key encapsulation/encryption submitted to NIST post-quantum competition (BIKE, QC-MDPC KEM, LEDA) are vulnerable against reaction attacks b...
SoK: Modular and Efficient Private Decision Tree Evaluation
Privacy-preserving protocols secure computation homomorphic encryption
2018/11/16
Decision trees and random forests are widely used classifiers in machine learning. Service providers often host classification models in a cloud service and provide an interface for clients to use the...
Binary Hash Tree based Certificate Access Management
Binary tree certificate access management
2017/8/10
We present a certificate access management system to support the USDOT's proposed rule on Vehicle-to-Vehicle (V2V) communications, Federal Motor Vehicle Safety Standard (FMVSS) No.~150. Our proposal, ...
Discussions are currently underway about the choice of a
tree hash mode of operation for a standardization. It appears that a
single tree mode cannot address the specificities of all possible uses a...
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Generalized birthday problem k-list problem k-tree algorithm
2016/3/23
We study two open problems proposed by Wagner in his seminal work on the generalized birthday problem. First, with the use of multicollisions, we improve Wagner's 3-tree algorithm. The new 3-tree only...
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Tree mode hashing SHA-256 SIMD architecture
2016/1/25
The j-lanes tree hashing is a tree mode that splits an input message to
j slices, computes j independent digests of each slice, and outputs the hash value
of their concatenation. The j-pointers tree...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Oblivious RAM (ORAM) has received increasing attention in the past few years. The goal of oblivious RAM is to enable a client, that can locally store only a small (preferably constant) amount of data,...
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
secured logging forward security seekability
2016/1/9
Computer log files constitute a precious resource for system administrators for discovering
and comprehending security breaches. A prerequisite of any meaningful log analysis is that
attempts of int...
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Cloud storage Access pattern privacy Oblivious RAM
2016/1/8
This paper proposes KT-ORAM, a new hybrid ORAM-PIR construction, to protect a client's access pattern to outsourced data. KT-ORAM organizes the server storage as a k-ary tree with each node acting as ...
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
hash functions Pre-image awareness time-stamping
2016/1/7
We present a new tighter security proof for unbounded hash tree keyless signature (timestamping)
schemes that use Merkle-Damgⅹard (MD) hash functions with Preimage Aware (PrA) compression
functions....
Although newly proposed, tree-based Oblivious RAM schemes are
drastically more efficient than older techniques, they come with a significant
drawback: an inherent dependence on a fixed-size database...
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Homomorphic encryption Composite Residuosity assumption tree-shaped assumption family
2016/1/5
Cryptographic primitives based on infinite families of progressively weaker assumptions
have been proposed by Hofheinz–Kiltz and by Shacham (the n-Linear assumptions)
and by Escala et al. (the Matri...
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Cloud service selection Brokerage system Merkle hash tree
2015/12/31
Cloud brokers have been recently introduced as an additional computational layer to facilitate cloud selection and service
management tasks for cloud consumers. However, existing brokerage schemes on...
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
Divisible E-Cash Anonymity Bilinear Groups
2015/12/22
Divisible e-cash, proposed in 1991 by Okamoto and Ohta, addresses a practical concern
of electronic money, the problem of paying the exact amount. Users of such systems can indeed
withdraw coins of ...