搜索结果: 1-15 共查到“rings”相关记录217条 . 查询时间(0.093 秒)



Tree rings and Iceland's Laki volcano eruption:A closer look at climate(图)
Tree rings Iceland Laki volcano eruption A closer look climate
2021/2/5
By reading between the lines of tree rings, U.S. National Science Foundation-funded researchers at the University of Arizona reconstructed what happened in Alaska the year the Laki Volc...
Efficient Information-Theoretic Secure Multiparty Computation over Z/pkZ via Galois Rings
MPC Galois Rings
2019/7/30
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPDZ2kZ2k that allows for secure multiparty computation (MPC) in the dishonest majority setting over the ring of integer...
Many cryptographic schemes have been proposed from learning with errors problems over some rings (Ring-LWE). Polynomial time quantum reduction from the approximating Shortest Independent Vectors Probl...
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
MPC Decision Trees SVM
2019/6/3
At CRYPTO 2018 Cramer et al. presented SPDZ2k, a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Th...
Improved Multiplication Triple Generation over Rings via SHE
Secure Two-party Computation Beaver Multiplication Triples Somewhat Homomorphic Encryption
2019/5/29
An important characteristic of recent MPC protocols is an input independent preprocessing phase in which most computations are offloaded, which greatly reduces the execution overhead of the online pha...
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Secure Computation Machine Learning 3PC
2019/4/28
The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present protocols for secure 33-party computation (3PC) tolerating one corruption in the offline...
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
post-quantum cryptography isogeny-based cryptography cryptanalysis
2018/4/26
In this paper, we study several related computational problems for supersingular elliptic curves, their isogeny graphs, and their endomorphism rings. We prove reductions between the problem of path fi...
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves
Supersingular isogeny based cryptography number theory
2017/10/10
Cryptosystems based on supersingular isogenies have been proposed recently for use in post-quantum cryptography. Three problems have emerged related to their hardness: computing an isogeny between two...
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
MPC Blackbox Compiler
2017/9/25
We present a very simple yet very powerful idea for turning any semi-honestly secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.
Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes
Polynomial Reduction Number Theoretic Transform Residue Number Systems
2017/8/9
With Fully Homomorphic Encryption (FHE), it is possible to process encrypted data without having an access to the private-key. This has a wide range of applications, most notably the offloading of sen...
Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings
lattice cryptography zero-knowledge proofs
2017/8/8
For a public value yy and a linear function ff, giving a zero-knowledge proof of knowledge of a secret value xx that satisfies f(x)=yf(x)=y is a key ingredient in many cryptographic protocols. Lattice...
Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs
Lattice cryptography Zero-Knowledge Proofs Ring-LWE
2017/6/6
In this work we show that one can use the optimal challenge sets CC and still have the polynomial Xn+1Xn+1 split into more than two factors. For the most common parameters that are used in such zero-k...

Penn Physicists Discover Why Drying Liquid Crystal Drops Leave Unusual “Coffee Rings”(图)
Penn Physicists Drying Liquid Crystal Drops Coffee Rings
2017/7/21
In previous papers, University of Pennsylvania physicists investigated the “coffee ring effect,” the ring-shaped stain of particles left after drops of coffee evaporate. In one paper, they learned how...