搜索结果: 1-5 共查到“军事学 general assumptions”相关记录5条 . 查询时间(0.152 秒)
Four-Round Secure Multiparty Computation from General Assumptions
multi-party computation oblivious transfer round optimal
2019/2/28
In this work we continue the study on the round complexity of secure multi-party computation with black-box simulation in the simultaneous broadcast model where all the parties get the output.
Private Set Intersection with Linear Communication from General Assumptions
PSI cryptographic protocols
2018/3/9
This work presents an improved hashing-based algorithm for Private Set Intersection (PSI) in the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic and concrete ...
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
cryptographic protocols / Garbled circuits cut-and-choose error correcting codes
2013/4/18
One of the main tools to construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based protocols with securi...
Efficient Encryption for Rich Message Spaces under General Assumptions
Efficient Encryption Rich Message Spaces General Assumptions
2009/4/16
We present a new family of public-key encryption schemes which combine modest computational demands
with provable security guarantees under only general assumptions. The schemes may be realized
with...
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
CCA2-Secure Public-Key Encryption General Assumptions
2009/4/14
In this paper we present a simpler construction of a public-key encryption scheme that
achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations.
We build ...