搜索结果: 1-15 共查到“军队指挥学 Key Generation”相关记录22条 . 查询时间(0.109 秒)
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
threshold cryptography distributed cryptography asynchronous consensus
2019/9/16
In this paper, we present the first fully asynchronous distributed key generation (ADKG) algorithm as well as the first distributed key generation algorithm that can create keys with a dual (f,2f+1)...
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Distributed Key Generation DKG Ethereum
2019/8/30
Distributed key generation (DKG) is a fundamental building block for a variety of cryptographic schemes and protocols, such as threshold cryptography, multi-party coin tossing schemes, public randomne...
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
digital signatures distributed cryptography implementation
2019/2/27
Migration of security applications to the cloud poses unique challenges in key management and protection: asymmetric keys which would previously have resided in tamper-resistant, on-premise Hardware S...
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
lattice techniques public-key cryptography quantum cryptography
2019/1/9
NTRU lattices are a class of polynomial rings which allow for compact and efficient representations of the lattice basis, thereby offering very good performance characteristics for the asymmetric algo...
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
public key cryptography multiparty computation fully homomorphic encryption
2018/12/3
Public-key cryptography applications often require structuring decryption rights according to some hierarchy. This is typically addressed with re-encryption procedures or relying on trusted parties, i...
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
ECDSA threshold cryptography
2018/11/5
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing, cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA in a distributed manner (kno...
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
cryptographic protocols post-quantum cryptosystem
2018/11/2
We show how to build distributed key generation and distributed decryption procedures for the LIMA Ring-LWE based post-quantum cryptosystem. Our protocols implement the CCA variants of distributed dec...
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
cryptographic protocols RSA
2018/6/7
We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Physical Unclonable Functions (PUFs) Fuzzy Extractor Coding Theory
2016/12/10
Physical Unclonable Functions (PUFs) provide cryptographic keys for embedded systems without secure non-volatile key storage. Several error correction schemes for key generation with PUFs were introdu...
Revisiting the Efficient Key Generation of ZHFE
quantum cryptography multivariate cryptography ZHFE
2016/12/7
ZHFE, proposed by Porras at el. at PQCrypto'14, is one of the very few existing multivariate encryption schemes and a very promising candidate for post-quantum cryptosystems. The only one drawback is ...
On the Security and Key Generation of the ZHFE Encryption Scheme
post-quantum cryptography multivariate public key cryptography HFE
2016/6/22
At PQCrypto'14 Porras, Baena and Ding proposed a new interesting construction to overcome the security weakness of the HFE encryption scheme, and called their new encryption scheme ZHFE. They provided...
PUF-based key generators have been widely considered as a
root-of-trust in digital systems. They typically require an error-correcting
mechanism (e.g. based on the code-offset method) for dealing wi...
Large-scale storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2)...
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
public-key cryptography / identity-based encryption revocation delegation
2013/2/21
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous ...