A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Smooth Projective Hashing for Conditionally Extractable Commitments
[chapter]
2009
Lecture Notes in Computer Science
Next, we illustrate how the use of smooth projective hash functions with more complex languages can be efficiently associated to extractable commitment schemes and avoid the need for zero-knowledge proofs ...
In this paper, we first address the problem of building smooth projective hash functions for more complex languages. ...
Acknowlegments This work was supported in part by the French ANR-07-SESU-008-01 PAMPA Project, and European Commission through the ICT program under contract ICT-2007-216676 ECRYPT II. ...
doi:10.1007/978-3-642-03356-8_39
fatcat:a5udzps7xbdhbkpq4l4rpjth44
Removing Erasures with Explainable Hash Proof Systems
[chapter]
2017
Lecture Notes in Computer Science
Explainable Projective Hashing. ...
More precisely, we first revisit the notion of projective hash proofs and introduce a new feature that allows us to explain any message sent by the simulator in case of corruption, hence the notion of ...
Acknowledgments This work was supported in part by the French ANR-12-INSE-0014 SIMPATIC Project, the CFM Foundation, and the European Research Council under the European Community's Seventh Framework Programme ...
doi:10.1007/978-3-662-54365-8_7
fatcat:qak4wib37nd4zlqonf42drbofa
Deep Hashing for Secure Multimodal Biometrics
2020
IEEE Transactions on Information Forensics and Security
Additionally, we also test the proposed hashing function for an image retrieval application using a benchmark dataset. ...
The main goal of this paper is to develop a method for integrating multimodal fusion, deep hashing, and biometric security, with an emphasis on structural data from modalities like face and iris. ...
ACKNOWLEDGMENT This research was funded by the Center for Identification Technology Research (CITeR), a National Science Foundation (NSF) Industry/University Cooperative Res. Center (I/UCRC). ...
doi:10.1109/tifs.2020.3033189
fatcat:gowcmokitvdarnj7s4qwgbmoqe
Universal Hashing for Information Theoretic Security
[article]
2016
arXiv
pre-print
In this article, we review a special class of practical schemes for information theoretic security that are based on 2-universal hash families. ...
The scheme presented for wiretap coding is modular and can be implemented easily by including an extra pre-processing layer over the existing transmission codes. ...
Note that smooth min-entropies replaces Shannon entropies as a measure of randomness in the context of randomness extraction (see [11, Section VI] for further discussion). ...
arXiv:1412.4958v4
fatcat:32iumu44gfawnklxxjhqxwaqwu
Universal Hashing for Information-Theoretic Security
2015
Proceedings of the IEEE
The information theoretic approach for security Himanshu Tyagi is with the [101], [52], [78], [96], respectively, for treatments of information theoretically secure oblivious transfer and bit commitment ...
In this article, we review a special class of practical schemes for information theoretic security that are based on 2-universal hash families. ...
Note that smooth min-entropies replaces Shannon entropies as a measure of randomness in the context of randomness extraction (see [11, Section VI] for further discussion). ...
doi:10.1109/jproc.2015.2462774
fatcat:bj34iooczneg3j32q6ipzajs54
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
[chapter]
2015
Lecture Notes in Computer Science
For fully adaptive corruption, we realize a relaxed ideal functionality that uses non-information oracles. ...
This allows for the further possibility that the partial-world CRS simulator may have access to additional trapdoors related to the language parameters. ...
Smooth projective hashing for
conditionally extractable commitments. In Shai Halevi, editor, CRYPTO 2009, volume
5677 of LNCS, pages 671-689. ...
doi:10.1007/978-3-662-48797-6_26
fatcat:rfvoetihbrcdtmyjcd7cuihrdi
Options for encoding names for data linking at the Australian Bureau of Statistics
[article]
2018
arXiv
pre-print
In 2016, the ABS engaged the University of Melbourne to provide expert advice on cryptographic hash functions to meet this objective. ...
Publicly, ABS has said it would use a cryptographic hash function to convert names collected in the 2016 Census of Population and Housing into an unrecognisable value in a way that is not reversible. ...
The ABS has made a public commitment to using a Cryptographic Hashing function. ...
arXiv:1802.07975v1
fatcat:y47qm2jajnfp3pgpvu33snrhsa
Blockchain-Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research
2021
Wireless Communications and Mobile Computing
A generalized blockchain-envisioned secure authentication framework for AIoT has been proposed. ...
AI methods can be used to transform IoT data into useful information for the better decision-making processes, and it further increases the overall usability of the system. ...
It also facilitates the commercial fleets and delivery modules for their safety and smooth executions. ...
doi:10.1155/2021/3866006
fatcat:m2uox7ksprgylabmayccocr4ti
Celer Network: Bring Internet Scale to Every Blockchain
[article]
2018
arXiv
pre-print
It is the inflection point for blockchain mass adoption, and will be the engine behind all scalable dApps. ...
off-chain applications; and a new cryptoeconomic model that provides network effect, stable liquidity, and high availability for the off-chain ecosystem. ...
More specifically, the mining process involves NLBs to commit (lock) their idle liquidity (for example, ETH) to a "dumb box", called Collateral Commitment Contract (CCC), for a certain period of time. ...
arXiv:1810.00037v1
fatcat:2semvq7ks5hsvp3b3qoyhmkrti
Distributed Ledger Technologies for Developing Asia
2017
Social Science Research Network
hashing power to cheat the rest of the network. ...
This reduces the time lags and costs associated with extracting project performance data and analyzing it manually 'off-chain.' ...
ADB is committed to reducing poverty through inclusive economic growth, environmentally sustainable growth, and regional integration. ...
doi:10.2139/ssrn.3187964
fatcat:xlficsveszbcvdfv6oawmzaggi
Culture as a Success Factor in International M&A Dispute Processes
2015
Social Science Research Network
As fate would have it, Maurice's general counsel found himself committed to another project (in hindsight of a much lower priority than the Japanese deal) and so the company's assistant general counsel ...
Given the alleged profits to be extracted from the PRC marketplace, foreign investors have agreed (or given in) to have arbitration in China in their dispute resolution clause given the pressure felt from ...
doi:10.2139/ssrn.2639348
fatcat:chcwp6udgbb7tbw6e6suopdd6y
D1.7 - Policy, transparency and compliance guidelines V2
2018
Zenodo
She then pays this advantage by using the computational power to break the bit commitment and extract the committed object. ...
Indeed, one player might receive the commitment to the object and decide not to send her commitment back. ...
doi:10.5281/zenodo.2549549
fatcat:5xwvoijxubb7xg4xerjdtekjq4
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
[article]
2022
arXiv
pre-print
Besides, we further dive into the source code of selected projects, and accordingly, propose our recommendation for the fix. ...
We have investigated 2,500+ in the wild projects and selected 10+ as our main focus (covering Ethereum, Binance smart chain, etc.). ...
Also, we thank Xinrui Zhang (SUSTech) for her help. Lastly, Qi Wang and Rujia Li are partially supported by the Shenzhen Fundamental Research Programs under Grant No.20200925154814002. ...
arXiv:2203.03008v2
fatcat:cegq66kkg5aevb6cvohoudpgpm
CSITSS Proceedings 2020
2019
2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)
Each of the frame, we extract MFCC features for the cry, fan and air-conditioner, music, and speech signals. ...
Hash
Functions
Key
Generation
Time
Signing
Time
Verification
Time
Hashing
Time
Hash
Functions
Key
Generation
Time
Signing
Time
Verification
Time
Hashing
Time
Hash
Functions ...
Studying regional languages for developing the system to store, retrieve, extract the information from the database has gained lots of prominence nowadays. ...
doi:10.1109/csitss47250.2019.9031039
fatcat:yehi3bfgbva7xm74vp3a3i54pu
Point-To-Point Communication
1994
The International Journal of Supercomputer Applications and High Performance Computing
KTH Skolan för Elektro-och Systemteknik School of Electrical Engineering 2013 Denna bok innehåller alla rapporter från kandidatexjobbskursen på skolan för elektro-och systemteknik, KTH, som pågick under ...
Av 50 studenter som framgångsrik avslutade kursen kommer 11 teknologer från Skolan för teknikvetenskap och två studenter från Skolan för informations-och kommunikationsteknik. ...
Secondly, for his commitment to the project and leadership, we would like to thank Georg Balmer.
ACKNOWLEDGEMENTS We would like to thank our supervisor, Dr. ...
doi:10.1177/109434209400800304
fatcat:fr4kdw72o5dl5fppqnlh5rixwq
« Previous
Showing results 1 — 15 out of 184 results