THE 发表于 2025-3-30 11:24:40
Irshad Ahmed Sumra,Ahmad Naeem Akhtarcal k-means algorithm. Compared to a state-of-the-art FHE-based scheme, our original algorithm not only outperforms theirs in accuracy but is also 4 orders of magnitude faster than theirs. In experiments testing our block algorithm, we conclude that the run time and memory consumption of this algoriaqueduct 发表于 2025-3-30 14:01:54
Israr Ahmad,Adeel Ahmed,Saima AbdullahCRS (or on the random oracle model). This improves on previous TREnc mechanisms that required a structured CRS and is of independent interest. A prototype implementation of our mechanisms is proposed, which shows that ballot preparation and verification can be executed in less than a second.JADED 发表于 2025-3-30 16:43:10
Engineering Software for Modern Challengesdata provided by both parties. The protocol is in the passively-secure setting and has some leakage on the data that arises from the comparison function on the ciphertexts. We motivate how our protocol can be compiled into an actively-secure protocol with less leakage using secure enclaves, in a graconscribe 发表于 2025-3-30 22:43:07
Asmaa Ahmed,Mohamed Elsakka,Ayman MohamedWe demonstrate that one-way permutations naturally yield subversion-resilient one-way functions, thereby enabling us to establish the subversion-resilience of Lamport signatures, assuming a trusted comparison is available. Additionally, we develop subversion-resilient target-collision-resistant hashcommonsense 发表于 2025-3-31 01:27:28
The Minerals, Metals & Materials Seriesr, the protocols use trapdoor homomorphic commitments as a further cryptographic building block, making their deployment in practice not as easy as standard lattice-based Fiat-Shamir signatures. In this work, we present a new construction of .-out-of-. distributed signatures. It is designed specific饥荒 发表于 2025-3-31 08:09:27
http://reply.papertrans.cn/16/1598/159730/159730_56.pnganticipate 发表于 2025-3-31 10:30:14
http://reply.papertrans.cn/16/1598/159730/159730_57.png混合物 发表于 2025-3-31 13:59:51
http://reply.papertrans.cn/16/1598/159730/159730_58.pngCREST 发表于 2025-3-31 17:47:31
A New Approach to Efficient and Secure Fixed-Point Computationn real-world applications require the usage of decimal numbers. While it is possible to emulate floating-point operations in MPC, fixed-point computation has gained more traction in the practical space due to its simplicity and efficient realizations. Even so, current protocols for fixed-point MPC s