THE 发表于 2025-3-30 11:24:40

Irshad Ahmed Sumra,Ahmad Naeem Akhtarcal k-means algorithm. Compared to a state-of-the-art FHE-based scheme, our original algorithm not only outperforms theirs in accuracy but is also 4 orders of magnitude faster than theirs. In experiments testing our block algorithm, we conclude that the run time and memory consumption of this algori

aqueduct 发表于 2025-3-30 14:01:54

Israr Ahmad,Adeel Ahmed,Saima AbdullahCRS (or on the random oracle model). This improves on previous TREnc mechanisms that required a structured CRS and is of independent interest. A prototype implementation of our mechanisms is proposed, which shows that ballot preparation and verification can be executed in less than a second.

JADED 发表于 2025-3-30 16:43:10

Engineering Software for Modern Challengesdata provided by both parties. The protocol is in the passively-secure setting and has some leakage on the data that arises from the comparison function on the ciphertexts. We motivate how our protocol can be compiled into an actively-secure protocol with less leakage using secure enclaves, in a gra

conscribe 发表于 2025-3-30 22:43:07

Asmaa Ahmed,Mohamed Elsakka,Ayman MohamedWe demonstrate that one-way permutations naturally yield subversion-resilient one-way functions, thereby enabling us to establish the subversion-resilience of Lamport signatures, assuming a trusted comparison is available. Additionally, we develop subversion-resilient target-collision-resistant hash

commonsense 发表于 2025-3-31 01:27:28

The Minerals, Metals & Materials Seriesr, the protocols use trapdoor homomorphic commitments as a further cryptographic building block, making their deployment in practice not as easy as standard lattice-based Fiat-Shamir signatures. In this work, we present a new construction of .-out-of-. distributed signatures. It is designed specific

饥荒 发表于 2025-3-31 08:09:27

http://reply.papertrans.cn/16/1598/159730/159730_56.png

anticipate 发表于 2025-3-31 10:30:14

http://reply.papertrans.cn/16/1598/159730/159730_57.png

混合物 发表于 2025-3-31 13:59:51

http://reply.papertrans.cn/16/1598/159730/159730_58.png

CREST 发表于 2025-3-31 17:47:31

A New Approach to Efficient and Secure Fixed-Point Computationn real-world applications require the usage of decimal numbers. While it is possible to emulate floating-point operations in MPC, fixed-point computation has gained more traction in the practical space due to its simplicity and efficient realizations. Even so, current protocols for fixed-point MPC s
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Applied Cryptography and Network Security; 22nd International C Christina Pöpper,Lejla Batina Conference proceedings 2024 The Editor(s) (if