Filters








184 Hits in 3.5 sec

Smooth Projective Hashing for Conditionally Extractable Commitments [chapter]

Michel Abdalla, Céline Chevalier, David Pointcheval
2009 Lecture Notes in Computer Science  
Next, we illustrate how the use of smooth projective hash functions with more complex languages can be efficiently associated to extractable commitment schemes and avoid the need for zero-knowledge proofs  ...  In this paper, we first address the problem of building smooth projective hash functions for more complex languages.  ...  Acknowlegments This work was supported in part by the French ANR-07-SESU-008-01 PAMPA Project, and European Commission through the ICT program under contract ICT-2007-216676 ECRYPT II.  ... 
doi:10.1007/978-3-642-03356-8_39 fatcat:a5udzps7xbdhbkpq4l4rpjth44

Removing Erasures with Explainable Hash Proof Systems [chapter]

Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2017 Lecture Notes in Computer Science  
Explainable Projective Hashing.  ...  More precisely, we first revisit the notion of projective hash proofs and introduce a new feature that allows us to explain any message sent by the simulator in case of corruption, hence the notion of  ...  Acknowledgments This work was supported in part by the French ANR-12-INSE-0014 SIMPATIC Project, the CFM Foundation, and the European Research Council under the European Community's Seventh Framework Programme  ... 
doi:10.1007/978-3-662-54365-8_7 fatcat:qak4wib37nd4zlqonf42drbofa

Deep Hashing for Secure Multimodal Biometrics

Veeru Talreja, Matthew Valenti, Nasser Nasrabadi
2020 IEEE Transactions on Information Forensics and Security  
Additionally, we also test the proposed hashing function for an image retrieval application using a benchmark dataset.  ...  The main goal of this paper is to develop a method for integrating multimodal fusion, deep hashing, and biometric security, with an emphasis on structural data from modalities like face and iris.  ...  ACKNOWLEDGMENT This research was funded by the Center for Identification Technology Research (CITeR), a National Science Foundation (NSF) Industry/University Cooperative Res. Center (I/UCRC).  ... 
doi:10.1109/tifs.2020.3033189 fatcat:gowcmokitvdarnj7s4qwgbmoqe

Universal Hashing for Information Theoretic Security [article]

Himanshu Tyagi, Alexander Vardy
2016 arXiv   pre-print
In this article, we review a special class of practical schemes for information theoretic security that are based on 2-universal hash families.  ...  The scheme presented for wiretap coding is modular and can be implemented easily by including an extra pre-processing layer over the existing transmission codes.  ...  Note that smooth min-entropies replaces Shannon entropies as a measure of randomness in the context of randomness extraction (see [11, Section VI] for further discussion).  ... 
arXiv:1412.4958v4 fatcat:32iumu44gfawnklxxjhqxwaqwu

Universal Hashing for Information-Theoretic Security

Himanshu Tyagi, Alexander Vardy
2015 Proceedings of the IEEE  
The information theoretic approach for security Himanshu Tyagi is with the [101], [52], [78], [96], respectively, for treatments of information theoretically secure oblivious transfer and bit commitment  ...  In this article, we review a special class of practical schemes for information theoretic security that are based on 2-universal hash families.  ...  Note that smooth min-entropies replaces Shannon entropies as a measure of randomness in the context of randomness extraction (see [11, Section VI] for further discussion).  ... 
doi:10.1109/jproc.2015.2462774 fatcat:bj34iooczneg3j32q6ipzajs54

Dual-System Simulation-Soundness with Applications to UC-PAKE and More [chapter]

Charanjit S. Jutla, Arnab Roy
2015 Lecture Notes in Computer Science  
For fully adaptive corruption, we realize a relaxed ideal functionality that uses non-information oracles.  ...  This allows for the further possibility that the partial-world CRS simulator may have access to additional trapdoors related to the language parameters.  ...  Smooth projective hashing for conditionally extractable commitments. In Shai Halevi, editor, CRYPTO 2009, volume 5677 of LNCS, pages 671-689.  ... 
doi:10.1007/978-3-662-48797-6_26 fatcat:rfvoetihbrcdtmyjcd7cuihrdi

Options for encoding names for data linking at the Australian Bureau of Statistics [article]

Chris Culnane, Benjamin I. P. Rubinstein, Vanessa Teague
2018 arXiv   pre-print
In 2016, the ABS engaged the University of Melbourne to provide expert advice on cryptographic hash functions to meet this objective.  ...  Publicly, ABS has said it would use a cryptographic hash function to convert names collected in the 2016 Census of Population and Housing into an unrecognisable value in a way that is not reversible.  ...  The ABS has made a public commitment to using a Cryptographic Hashing function.  ... 
arXiv:1802.07975v1 fatcat:y47qm2jajnfp3pgpvu33snrhsa

Blockchain-Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research

Mohammad Wazid, Ashok Kumar Das, Youngho Park, Jose Santa
2021 Wireless Communications and Mobile Computing  
A generalized blockchain-envisioned secure authentication framework for AIoT has been proposed.  ...  AI methods can be used to transform IoT data into useful information for the better decision-making processes, and it further increases the overall usability of the system.  ...  It also facilitates the commercial fleets and delivery modules for their safety and smooth executions.  ... 
doi:10.1155/2021/3866006 fatcat:m2uox7ksprgylabmayccocr4ti

Celer Network: Bring Internet Scale to Every Blockchain [article]

Mo Dong, Qingkai Liang, Xiaozhou Li, Junda Liu
2018 arXiv   pre-print
It is the inflection point for blockchain mass adoption, and will be the engine behind all scalable dApps.  ...  off-chain applications; and a new cryptoeconomic model that provides network effect, stable liquidity, and high availability for the off-chain ecosystem.  ...  More specifically, the mining process involves NLBs to commit (lock) their idle liquidity (for example, ETH) to a "dumb box", called Collateral Commitment Contract (CCC), for a certain period of time.  ... 
arXiv:1810.00037v1 fatcat:2semvq7ks5hsvp3b3qoyhmkrti

Distributed Ledger Technologies for Developing Asia

Benno Ferrarini, Julie A. Maupin, Marthe Hinojales
2017 Social Science Research Network  
hashing power to cheat the rest of the network.  ...  This reduces the time lags and costs associated with extracting project performance data and analyzing it manually 'off-chain.'  ...  ADB is committed to reducing poverty through inclusive economic growth, environmentally sustainable growth, and regional integration.  ... 
doi:10.2139/ssrn.3187964 fatcat:xlficsveszbcvdfv6oawmzaggi

Culture as a Success Factor in International M&A Dispute Processes

Arthur J Gemmell
2015 Social Science Research Network  
As fate would have it, Maurice's general counsel found himself committed to another project (in hindsight of a much lower priority than the Japanese deal) and so the company's assistant general counsel  ...  Given the alleged profits to be extracted from the PRC marketplace, foreign investors have agreed (or given in) to have arbitration in China in their dispute resolution clause given the pressure felt from  ... 
doi:10.2139/ssrn.2639348 fatcat:chcwp6udgbb7tbw6e6suopdd6y

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
She then pays this advantage by using the computational power to break the bit commitment and extract the committed object.  ...  Indeed, one player might receive the commitment to the object and decide not to send her commitment back.  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4

Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies [article]

Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang
2022 arXiv   pre-print
Besides, we further dive into the source code of selected projects, and accordingly, propose our recommendation for the fix.  ...  We have investigated 2,500+ in the wild projects and selected 10+ as our main focus (covering Ethereum, Binance smart chain, etc.).  ...  Also, we thank Xinrui Zhang (SUSTech) for her help. Lastly, Qi Wang and Rujia Li are partially supported by the Shenzhen Fundamental Research Programs under Grant No.20200925154814002.  ... 
arXiv:2203.03008v2 fatcat:cegq66kkg5aevb6cvohoudpgpm

CSITSS Proceedings 2020

2019 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)  
Each of the frame, we extract MFCC features for the cry, fan and air-conditioner, music, and speech signals.  ...  Hash Functions Key Generation Time Signing Time Verification Time Hashing Time Hash Functions Key Generation Time Signing Time Verification Time Hashing Time Hash Functions  ...  Studying regional languages for developing the system to store, retrieve, extract the information from the database has gained lots of prominence nowadays.  ... 
doi:10.1109/csitss47250.2019.9031039 fatcat:yehi3bfgbva7xm74vp3a3i54pu

Point-To-Point Communication

1994 The International Journal of Supercomputer Applications and High Performance Computing  
KTH Skolan för Elektro-och Systemteknik School of Electrical Engineering 2013 Denna bok innehåller alla rapporter från kandidatexjobbskursen på skolan för elektro-och systemteknik, KTH, som pågick under  ...  Av 50 studenter som framgångsrik avslutade kursen kommer 11 teknologer från Skolan för teknikvetenskap och två studenter från Skolan för informations-och kommunikationsteknik.  ...  Secondly, for his commitment to the project and leadership, we would like to thank Georg Balmer. ACKNOWLEDGEMENTS We would like to thank our supervisor, Dr.  ... 
doi:10.1177/109434209400800304 fatcat:fr4kdw72o5dl5fppqnlh5rixwq
« Previous Showing results 1 — 15 out of 184 results