搜索结果: 1-15 共查到“军事学 proof”相关记录142条 . 查询时间(0.181 秒)
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
Halo: Recursive Proof Composition without a Trusted Setup
zero knowledge elliptic curve cryptosystem
2019/9/16
Non-interactive proofs of knowledge allow us to publicly demonstrate the faithful execution of arbitrary computations. SNARKs have the additional property of succinctness, meaning that the proofs are ...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function from the family, an input output pair that satisfies the relation. Correl...
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Blockchain Consensus Clock Synchronization
2019/7/22
Proof-of-stake (PoS) has been shown to be a suitable replacement—in many respects—for the expensive proof-of-work mechanism introduced by the Bitcoin protocol. Nevertheless, one common and seemingly i...
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Cryptocurrencies blockchain smart contracts
2019/7/4
The feasibility of bribing attacks on cryptocurrencies was first highlighted in 2016, with various new techniques and approaches having since been proposed. Recent reports of real world 51%51% attacks...
We reveal Revelio, a new privacy-preserving proof of reserves protocol for Grin exchanges. By design, Revelio allows the detection of collusion between exchanges while hiding the identities of the out...
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
proof-of-stake secure initialization uniqueness
2019/5/13
We present "UniqueChain", a proof-of-stake based blockchain protocol that achieves secure initialization of newly joining parties without any additional trusted assumptions and fast messages (transact...
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems
snark stark bulletproofs
2019/5/13
The area of practical proof systems, like SNARKs, STARKs, or Bulletproofs, is seeing a very dynamic development. Many use-cases of such systems involve, often as their most expensive apart, proving th...
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems
snark stark bulletproofs
2019/5/13
The area of practical proof systems, like SNARKs, STARKs, or Bulletproofs, is seeing a very dynamic development. Many use-cases of such systems involve, often as their most expensive apart, proving th...
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonym...
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
one-way functions zero knowledge proof computational independence
2019/4/1
We introduce the concept of computationally independent pair of one-way functions (CI-OWF). We also provide two rich classes of examples of such functions based on standard assumptions. We revisit two...