搜索结果: 1-8 共查到“军事学 tolerance”相关记录8条 . 查询时间(0.143 秒)
Another Look at Byzantine Fault Tolerance
cryptographic protocols Byzantine Fault Tolerance
2019/7/26
We review several solutions for the Byzantine Fault Tolerance (BFT) problem and discuss some aspects that are frequently overlooked by existing literatures. For example, PBFT and HotStuff BFT protocol...
Murphy, Murky, Mopey, Moody, and Morose decide to write a paper together over the Internet and submit it to the prestigious CRYPTO’19 conference that has the most amazing PC. They encounter a few prob...
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks ...
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
password authentication key exchange fault tolerance
2016/1/23
A threshold password-authenticated key exchange (T-PAKE) protocol allows a set of n servers to collectively authenticate a client with a human-memorizable password such that any subset of size great...
On the Connection between Leakage Tolerance and Adaptive Security
leakage resilience adaptive security
2016/1/8
More generally, we show that any n party protocol tolerates leakage of ≈\poly(log\spar) bits from one party at the end of the protocol execution, \emph{if and only if} the protocol has passive adaptiv...
Privacy-Preserving Stream Aggregation with Fault Tolerance
Differential Privacy Periodic Aggregation Untrusted Aggregator Fault Tolerance
2012/6/14
We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operato...
Privacy-Preserving Stream Aggregation with Fault Tolerance
applications / Differential Privacy Periodic Aggregation Untrusted Aggregator Fault Tolerance Dynamic Users
2012/3/20
We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operato...
Topology Knowledge Versus Fault Tolerance:The Case of Probabilistic Reliable Communication Or: How Far Must You See to Hear Reliably
reliable communication topology knowledge synchronous networks
2009/6/9
We consider the problem of probabilistic reliable communication (PRC) over synchronous
networks modeled as directed graphs in the presence of a Byzantine adversary when players’ knowledge
of the net...